LER(r1, 0x84, 0x7b, &(0x7f0000000140)={r2, 0x1}, &(0x7f0000000180)=0x8) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000000)={0x6}) [ 2382.385039][T10066] JFS: Cannot determine volume size [ 2382.404511][T10066] JFS: Cannot determine volume size 04:22:07 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0xd00}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) [ 2382.429038][T10066] jfs: Unrecognized mount option "fscontext=system_u" or missing value [ 2382.519120][T10066] JFS: Cannot determine volume size [ 2382.524359][T10066] JFS: Cannot determine volume size [ 2382.539932][T10066] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:22:08 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000001700)={[{@resize='resize'}, {@resize='resize'}, {@resize_size={'resize'}}, {@discard_size={'discard', 0x3d, 0x200}}, {@iocharset={'iocharset', 0x3d, 'macroman'}}, {@resize_size={'resize', 0x3d, 0x400}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@euid_eq={'euid'}}], 0x8cffffff}) 04:22:08 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x2000, 0x0, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:08 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000000)={0x5cc}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000080)=0x0) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000140)={0x3, &(0x7f0000000100)=[{0xdae, 0x4, 0x6}, {0x7, 0x5, 0x400, 0x2}, {0x1, 0x2, 0x5, 0x7}]}) keyctl$set_reqkey_keyring(0xe, 0x2) syz_open_procfs(r1, &(0x7f00000000c0)='cpuset\x00') 04:22:08 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3000000, 0x0, 0x0, 0x0) 04:22:08 executing program 1: prctl$PR_GET_TSC(0x19, &(0x7f0000000040)) r0 = socket$inet(0x2, 0x4000000000000001, 0x100) sendto$inet(r0, 0x0, 0x0, 0x80000400200007fe, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) ioctl$sock_SIOCADDDLCI(r0, 0x8980, &(0x7f00000000c0)={'nr0\x00', 0x3f}) bind$inet(r0, &(0x7f0000000000), 0x10) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000100)='/dev/null\x00', 0x200, 0x0) ioctl$sock_bt_cmtp_CMTPCONNDEL(r1, 0x400443c9, &(0x7f0000000140)={{0xfff, 0x3, 0x0, 0x5, 0x9}, 0x2}) 04:22:08 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0xe80}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) [ 2382.663535][ T26] audit: type=1326 audit(1547612528.190:170): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=10084 comm="syz-executor3" exe="/root/syz-executor3" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45ad2a code=0x0 04:22:08 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80000400200007fe, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e21}, 0x10) 04:22:08 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x4000000, 0x0, 0x0, 0x0) 04:22:08 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x1100}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:08 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x2800, 0x0, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:08 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80000400200007fe, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/dev_snmp6\x00') setsockopt$RXRPC_UPGRADEABLE_SERVICE(r1, 0x110, 0x5, &(0x7f00000000c0)=[0x3, 0x4], 0x2) bind$inet(r0, &(0x7f0000000000), 0x10) [ 2382.773410][T10099] JFS: Cannot determine volume size [ 2382.778659][T10099] JFS: Cannot determine volume size [ 2382.789630][T10099] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:22:08 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x1400}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) [ 2382.870840][T10099] JFS: Cannot determine volume size [ 2382.876084][T10099] JFS: Cannot determine volume size [ 2382.886996][T10099] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:22:08 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000001700)={[{@resize='resize'}, {@resize='resize'}, {@resize_size={'resize'}}, {@discard_size={'discard', 0x3d, 0x200}}, {@iocharset={'iocharset', 0x3d, 'macroman'}}, {@resize_size={'resize', 0x3d, 0x400}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@euid_eq={'euid'}}], 0xc0ed0000}) 04:22:08 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x5000000, 0x0, 0x0, 0x0) [ 2383.086573][T10117] JFS: Cannot determine volume size [ 2383.091917][T10117] JFS: Cannot determine volume size [ 2383.097138][T10117] jfs: Unrecognized mount option "fscontext=system_u" or missing value [ 2383.145036][T10117] JFS: Cannot determine volume size [ 2383.156369][T10117] JFS: Cannot determine volume size [ 2383.163015][T10117] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:22:09 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) r1 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vfio/vfio\x00', 0x230040, 0x0) setsockopt$inet6_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f00000000c0)="88c1c34705fb6b000100000000000056", 0x10) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000000)={0x6}) 04:22:09 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x3580, 0x0, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:09 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) fsetxattr$security_evm(r1, &(0x7f0000000100)='security.evm\x00', &(0x7f0000000140)=@sha1={0x1, "1e4a502622ae8c91e50099d9ed8203c8a4e14547"}, 0x15, 0x0) r2 = accept$inet6(r1, &(0x7f0000000540)={0xa, 0x0, 0x0, @initdev}, &(0x7f00000000c0)=0x234) sendto$inet(r0, 0x0, 0x0, 0x80000400200007fe, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000240)={{{@in=@loopback, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@ipv4={[], [], @remote}}}, &(0x7f0000000340)=0xe8) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000380)={0x0, 0x0}, &(0x7f00000003c0)=0xc) lstat(&(0x7f0000000400)='./file0\x00', &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(r3, r4, r5) bind$inet(r0, &(0x7f0000000000), 0x10) r6 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x3f, 0x0) openat$cgroup_subtree(r6, &(0x7f00000004c0)='cgroup.subtree_control\x00', 0x2, 0x0) setsockopt$inet_sctp6_SCTP_RECVNXTINFO(r2, 0x84, 0x21, &(0x7f0000000180)=0x1, 0x4) r7 = openat$mixer(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/mixer\x00', 0x10000, 0x0) openat$cgroup_procs(r7, &(0x7f0000000200)='tasks\x00', 0x2, 0x0) 04:22:09 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x1c00}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:09 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6000000, 0x0, 0x0, 0x0) 04:22:09 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000001700)={[{@resize='resize'}, {@resize='resize'}, {@resize_size={'resize'}}, {@discard_size={'discard', 0x3d, 0x200}}, {@iocharset={'iocharset', 0x3d, 'macroman'}}, {@resize_size={'resize', 0x3d, 0x400}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@euid_eq={'euid'}}], 0xf6ffffff}) [ 2383.450885][ T26] audit: type=1326 audit(1547612528.980:171): auid=4294967295 uid=0 gid=0 ses=4294967295 subj==unconfined pid=10084 comm="syz-executor3" exe="/root/syz-executor3" sig=9 arch=c000003e syscall=228 compat=0 ip=0x45ad2a code=0x0 04:22:09 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7000000, 0x0, 0x0, 0x0) 04:22:09 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x3f00, 0x0, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2383.571058][T10131] JFS: Cannot determine volume size 04:22:09 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x2000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) [ 2383.617856][T10131] JFS: Cannot determine volume size 04:22:09 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80000400200007fe, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) bind$inet(r0, &(0x7f0000000000), 0x10) syz_open_dev$evdev(&(0x7f0000000040)='/dev/input/event#\x00', 0xe5, 0x80) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x8100, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000140), &(0x7f0000000180)=0x14) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000100)={0x100, 0x7, 0x4, 0x0, 0x200000000000000}, 0x14) 04:22:09 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0xfc, 0x20000) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000000)={0x6}) [ 2383.649438][T10131] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:22:09 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x8000000, 0x0, 0x0, 0x0) 04:22:09 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x4000, 0x0, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:09 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x3580}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:09 executing program 1: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/rtc0\x00', 0x40000, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80000400200007ff, &(0x7f0000000280)={0x2, 0x0, @local}, 0x10) bind$inet(0xffffffffffffffff, &(0x7f0000000000), 0x10) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/rfkill\x00', 0x400000, 0x0) ioctl$SNDRV_SEQ_IOCTL_REMOVE_EVENTS(r1, 0x4040534e, &(0x7f0000000200)={0x0, @tick=0xc24, 0x3, {0x9, 0x6}, 0x80000001, 0x3, 0x9}) r2 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x53ac15e1, 0x111000) write$P9_RVERSION(r2, &(0x7f00000000c0)={0x15, 0x65, 0xffff, 0xfffffffffffffffc, 0x8, '9P2000.u'}, 0x15) fcntl$getown(r2, 0x9) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm-control\x00', 0x800, 0x0) write$nbd(r3, &(0x7f0000000140)={0x67446698, 0x1, 0x1, 0x4, 0x3, "a132c86260d5244fb4cc024cc802b5a27df906ccc017763c44b3d701e8492ff2f9dd6318c29c7e073502a0926b569deab2bf141a2dc78b5a04932eb0c4949ddc0e46d94db385cf2b730a4a92a78c8dafabcb99f70929e007"}, 0x68) [ 2383.781782][T10131] JFS: Cannot determine volume size [ 2383.799534][T10131] JFS: Cannot determine volume size 04:22:09 executing program 3: pipe(&(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$DRM_IOCTL_PRIME_FD_TO_HANDLE(r1, 0xc00c642e, &(0x7f0000000140)={0x0, 0x80000, r0}) ioctl$sock_SIOCOUTQ(r1, 0x5411, &(0x7f0000000080)) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000000200)={0x0, r2, 0x3a5}) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000000240)={0x0, r2, 0x7fff}) ioctl$DRM_IOCTL_GEM_FLINK(r0, 0xc008640a, &(0x7f00000000c0)={r2, r3}) ioctl$DRM_IOCTL_GEM_CLOSE(r0, 0x40086409, &(0x7f0000000100)={r4}) r5 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r0, 0x8040ae9f, &(0x7f0000000180)) setsockopt$bt_BT_DEFER_SETUP(r1, 0x112, 0x7, &(0x7f0000000280)=0x1, 0x4) ioctl$DRM_IOCTL_GET_CAP(r5, 0xc010640c, &(0x7f0000000000)={0x6}) 04:22:09 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x9000000, 0x0, 0x0, 0x0) [ 2383.826749][T10131] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:22:09 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000001700)={[{@resize='resize'}, {@resize='resize'}, {@resize_size={'resize'}}, {@discard_size={'discard', 0x3d, 0x200}}, {@iocharset={'iocharset', 0x3d, 'macroman'}}, {@resize_size={'resize', 0x3d, 0x400}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@euid_eq={'euid'}}], 0xf9fdffff}) 04:22:09 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x3f00}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:09 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x4305, 0x0, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:09 executing program 1: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000400200007fe, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000340)='/dev/dlm_plock\x00', 0x141, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000100), 0x10) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f00000000c0)={0x1, &(0x7f0000000000)=[{0x0}]}) ioctl$DRM_IOCTL_DMA(r0, 0xc0406429, &(0x7f0000000240)={r1, 0x2, &(0x7f0000000140)=[0x10000, 0x3], &(0x7f0000000180)=[0xc3a, 0x245, 0x24000000, 0x7f, 0x1], 0x40, 0x5, 0x7, &(0x7f00000001c0)=[0x1f, 0x4, 0x7, 0x8, 0x20], &(0x7f0000000200)=[0x8000, 0x0, 0x4, 0x10001, 0x6f4, 0x9, 0x7, 0x9]}) fcntl$F_SET_FILE_RW_HINT(0xffffffffffffffff, 0x40e, &(0x7f0000000040)=0x4) 04:22:09 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_IRQCHIP(r1, 0x4040ae77, 0x0) r2 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_CAP(r2, 0xc010640c, &(0x7f0000000000)={0x6}) 04:22:09 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xa000000, 0x0, 0x0, 0x0) 04:22:09 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x10000000, 0x0, 0x0, 0x0) 04:22:09 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x4788, 0x0, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:09 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x4305}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) [ 2384.034281][T10174] JFS: Cannot determine volume size [ 2384.093560][T10174] JFS: Cannot determine volume size 04:22:09 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80000400200007fe, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) bind$inet(r0, &(0x7f0000000000), 0x10) r1 = fcntl$dupfd(r0, 0x406, r0) setsockopt$CAIFSO_REQ_PARAM(r1, 0x116, 0x80, &(0x7f00000000c0)="994f597459cd75bc760b7cddf9aed734101c781f71b803bce810ae6b9737d84704d1cb92073f0d9b14a919e4fade8d45ea276b87ba6d2ddc6e5f1de7b94b8e83b43433383286cc69de15f3a3525a6b3e94e3143de9bd7fd650159f0c52f4b651bd7645a84c8a8d56954a2af1902dbfb47b4fb11dce3435761a1cc0a7723558e30b1cc8e57afa3d9ce5f0d3e4f039", 0x8e) 04:22:09 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000000)={0x6}) personality(0x400000) openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x400000, 0x0) socket$inet_dccp(0x2, 0x6, 0x0) 04:22:09 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x190f0000, 0x0, 0x0, 0x0) [ 2384.115757][T10174] jfs: Unrecognized mount option "fscontext=system_u" or missing value [ 2384.209590][T10174] JFS: Cannot determine volume size [ 2384.214839][T10174] JFS: Cannot determine volume size [ 2384.214870][T10174] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:22:09 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x4888, 0x0, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:09 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) r1 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000140)='/dev/cachefiles\x00', 0x101000, 0x0) r2 = openat$cachefiles(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/cachefiles\x00', 0x80001, 0x0) ioctl$VHOST_SET_VRING_ERR(r1, 0x4008af22, &(0x7f0000000100)={0x1, r2}) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000000)={0x6}) 04:22:09 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x4788}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:09 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1f000000, 0x0, 0x0, 0x0) 04:22:09 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000001700)={[{@resize='resize'}, {@resize='resize'}, {@resize_size={'resize'}}, {@discard_size={'discard', 0x3d, 0x200}}, {@iocharset={'iocharset', 0x3d, 'macroman'}}, {@resize_size={'resize', 0x3d, 0x400}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@euid_eq={'euid'}}], 0xfcfdffff}) 04:22:09 executing program 1: chroot(&(0x7f0000000380)='./file0\x00') r0 = socket$inet(0x2, 0x4000000000000001, 0xfffffffffffffffd) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000140)='/dev/btrfs-control\x00', 0x8000, 0x0) perf_event_open$cgroup(&(0x7f00000000c0)={0x0, 0x70, 0x6, 0x8, 0x6, 0x1, 0x0, 0x7, 0xc400, 0x2, 0x1, 0x4, 0xbe0f, 0x4, 0x5, 0x5, 0x8, 0x6, 0x9, 0x80000001, 0x1ff, 0xffffffffffffffd9, 0x7, 0x54, 0x1, 0x10000, 0x7, 0x7f20, 0x1ff, 0xfffffffffffffff8, 0x4, 0xb, 0x3, 0x5, 0x8, 0x709, 0x80000001, 0x3ad, 0x0, 0xe, 0x0, @perf_bp={&(0x7f0000000040), 0x1}, 0x1, 0xfffffffffffffff9, 0x1, 0x0, 0x1, 0x5, 0x8000}, r1, 0x1, 0xffffffffffffffff, 0x8) ioctl$VIDIOC_ENUM_DV_TIMINGS(r1, 0xc0945662, &(0x7f0000000180)={0x9, 0x0, [], {0x0, @reserved}}) bpf$BPF_PROG_TEST_RUN(0xa, &(0x7f0000000340)={r1, 0x0, 0x45, 0x6e, &(0x7f0000000240)="80543a8fafda8c6c396f490b75e956c3863df47906c3b223b3f9e7b52f43218deea5abed01f2dda1e3017f60d1e9a8f9496770b5eb1a401c47c093d1fe555b1daa558bda14", &(0x7f00000002c0)=""/110, 0x3aaf}, 0x28) sendto$inet(r0, 0x0, 0x0, 0x80000400200007fe, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f0000000400)={0x0, 0x18, 0xfa00, {0x2, &(0x7f00000003c0), 0x13f, 0x4}}, 0x20) bind$inet(r0, &(0x7f0000000000), 0x10) 04:22:09 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x20000000, 0x0, 0x0, 0x0) 04:22:09 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) r1 = semget$private(0x0, 0x4, 0x0) semctl$IPC_INFO(r1, 0x2, 0x3, &(0x7f0000000080)=""/142) r2 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/vsock\x00', 0x40000, 0x0) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f00000001c0)=0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000240)={0xffffffffffffffff, 0xffffffffffffff9c, 0x0, 0x5c9, &(0x7f0000000200)='/dev/dri/card#\x00'}, 0x30) sendmsg$nl_netfilter(r2, &(0x7f0000001580)={&(0x7f0000000180), 0xc, &(0x7f0000001540)={&(0x7f0000000280)=ANY=[@ANYBLOB="9c120000070310002abd7000fcdbdf25010000017c001f00f1b2791b279a99ec2d8de65c9361089acbeeaa02b105eec6ebe57889e886e74560f62438c835134cb95827b1e1aec6abc95e627b9a15cd7b951c89c1d7d0393aef220ba5f18be6547d1d4e45ee0edfb50e0b84c82456322ded47e38065dab6eff1cd1d86460c3d2fe6778f42d97396d1385a62210100000068112b0008003600", @ANYRES32=r3, @ANYBLOB='\f\x00s\x00\x00\b\x00\x00\x00\x00\x00\x00\b\x00\r\x00', @ANYRES32=r4, @ANYBLOB="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", @ANYRES32=r0, @ANYBLOB="08002e0081000000d0590428e293a6d32ba7f5dbe3a8eb505f08ba3960dadf40c052bde5bc2ddf8d7c940a4f4c300ebb8f4f3942e43037abf21bc84441529b93f1ca27e2792f5216655ad20076c839802be0d3888b0cb40ac9f7e5bc176c12af1ec2a224886305e1a0a74fe70ae88d9d6ce25c0837839385112791f26a4354ce6f4e717a72b477616482fd5cb45d087274bbd01f2fea2c8a34e2796345f4d4959cb8047c284d83d540daedaca9b057751c13ed4a9573029291a50653eed8e23e0f8838d58ee708a827fba656f3eee31128c26060874f1161aea8aee1a037118efe0443097001145f77f9b40951cb8f349e09f3b8854ed9c5594f6f588e5b404f7f3dad934d2ec40a6a5fa97df3a318649bceb41b6cab957e1cd68fb632fb61f6435398999ecbdfb61059566ab32a837aadcbd79b64161500d9d5530731bd7e275873242c9a76364eed1d69d22c1d66862e4c1823cc7f424a19cbc188094f2bc4fdcf2fca32c9c229e096ef9d00472d981527fc2bc27c2f6884895aa3d106850609b2f87d8f6aebaed30046ed6ac5cf27020ea5bfa289d46fab6e1798f74f6c7d78c3320d63697e9a93e3b079ce7863c96a3623e076a4996f6db9efc21a14d859907b3bbce6cf93b80427378a47c5030a298b9ef6aee37e93523342c9c2ebcf6c3e32c400"], 0x129c}, 0x1, 0x0, 0x0, 0x8000}, 0x815) r6 = fcntl$dupfd(r0, 0x0, r5) setsockopt$SO_BINDTODEVICE(r6, 0x1, 0x19, &(0x7f00000015c0)='syz_tun\x00', 0x10) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000000)={0x6}) 04:22:09 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x6488, 0x0, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:09 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80000400200007fe, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) getsockopt$EBT_SO_GET_INFO(r0, 0x0, 0x80, &(0x7f00000000c0)={'filter\x00'}, &(0x7f0000000040)=0x78) bind$inet(r0, &(0x7f0000000000), 0x10) 04:22:09 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x4888}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) [ 2384.425386][T10207] JFS: Cannot determine volume size [ 2384.446019][T10207] JFS: Cannot determine volume size [ 2384.478444][T10207] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:22:10 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x20100000, 0x0, 0x0, 0x0) 04:22:10 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) r1 = openat$audio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/audio\x00', 0xc0, 0x0) mq_timedreceive(r1, &(0x7f00000000c0)=""/104, 0x68, 0x88b, &(0x7f0000000140)={0x0, 0x989680}) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000000)={0x6}) getsockopt$inet6_IPV6_IPSEC_POLICY(r1, 0x29, 0x22, &(0x7f00000001c0)={{{@in=@multicast1, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@remote}}, &(0x7f00000002c0)=0xe8) r3 = geteuid() sendmsg$nl_netfilter(r1, &(0x7f0000000680)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x80004}, 0xc, &(0x7f0000000640)={&(0x7f0000000300)={0x308, 0xe, 0x4, 0x614, 0x70bd27, 0x25dfdbfd, {0x2, 0x0, 0xa}, [@typed={0x8, 0x50, @uid=r2}, @generic="73569f2500ebeb7edcae5112e7867376a804b97a7b6c8d0e9b5263418606c7ef13e8f1d6fcf673153e37f930ce7ea27462a43bc74c363529809ebf936217933b77cb0c4afc464104a8804879643c4689177d2daef0875346acc3f7619ada361ac2514158bb1cea691f018ad29c70b2fc6c0f167268f74047dd0adf5eaa6ded1a08f550da406e0f3d6055d59cf9543611edaa6a2a179c23e19e145c83f8bf9ffc5a4e824b833ea82dbe620640ce1b3b56a4adc8f247d24a15e61a03c9f4c81049cdc948655f26b97a74060fd013b05f45952ed7205114f47b8ec1507149d43e88a693a6075976122651ec3b6ece8004bd", @nested={0x118, 0x4d, [@typed={0x14, 0x29, @ipv6=@dev={0xfe, 0x80, [], 0xa}}, @typed={0x8, 0x42, @str='{\x00'}, @typed={0xc, 0x27, @u64=0xfffffffffffffff7}, @generic="f51e5fe662546f4ebf298079a8b694c4b12e1b42da0705318359169f25382e011c0756558ba466db7782fdeb7713017e8b74d0d0dc8138d77c2649f590418bb3ce1d00ddad20ad96eee0be1d5bfb72d758ceda10e6d87766b78a325dc01482d5d2f66e91deee048aa00f3c9702d7d4d3fa32deb0b492495762a390e511cb2591512190b762f83d8644aec81759eee8f3c74441fc150160bb95fa4ba379353d1705dd4d145930f01b4d17b6c1b5c01487e7f07662918168d9d3098be36ea1aa76777a729e46816693b0a4bff0f29725aec32f6e325d22ab454d629da881f2f7222d2a47d3f91f6eeb94a643b8"]}, @generic="1e5c72b1f43f727c757ea52e8231a250d59c6242a06199feda7f0e8046", @nested={0xbc, 0x5b, [@generic="d3829ac8a08b30f7d07c1c429af2f4111e83c46684b336b4fa770c7aacf5b1a451c6f65eab3c8afb88f2011cd58a56fca5648ac19c58d1c8917abe30e9cf841ca409031ff6178bc9f17acc307e4bae24ad9ce00ad01c547799680e6d3a9e29ea4bcca5b8bde07b3b101a834a5cde6282d1aaa94f53dc7265ffc86be3e2f8bbb35970aecdc9a12c8b59a5c4b05012876958fcdcd75583d7dfaa0420e5426434715f2b8a770c9752b969bdf9de20ccbc9905fcb4a89f3ff1"]}, @typed={0x8, 0x1e, @uid=r3}]}, 0x308}, 0x1, 0x0, 0x0, 0x4000}, 0x8001) 04:22:10 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = syz_open_dev$midi(&(0x7f0000000000)='/dev/midi#\x00', 0x0, 0x440002) accept$netrom(r1, &(0x7f0000000100)={{0x3, @netrom}, [@null, @default, @null, @remote, @bcast, @remote, @bcast]}, &(0x7f0000000040)=0x48) ioctl$RTC_VL_CLR(r1, 0x7014) sendto$inet(r0, 0x0, 0x0, 0x80000400200007fe, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) ioctl$VIDIOC_QUERY_DV_TIMINGS(r1, 0x80845663, &(0x7f0000000380)) r2 = add_key(&(0x7f0000000180)='id_resolver\x00', &(0x7f00000001c0)={'syz', 0x3}, &(0x7f0000000200)="2aace55dd63e2154a21026286f2b66552e2eaeabcbcaeeff42b56da3a76d18fc2cb3ebf4d2ac145c076640bdf01f7f82be7ca56135d1eebda45dec2d0ee8a6bc385f239caf1a6411052f8d5410", 0x4d, 0xfffffffffffffffd) keyctl$describe(0x6, r2, &(0x7f0000000280)=""/197, 0xc5) getsockopt$netrom_NETROM_T4(r1, 0x103, 0x6, &(0x7f0000000440)=0x7, &(0x7f0000000480)=0x4) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x3, @local}, 0xfffffffffffffea4) 04:22:10 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x800e, 0x0, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2384.559093][T10207] JFS: Cannot determine volume size [ 2384.566333][T10207] JFS: Cannot determine volume size 04:22:10 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x6000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) [ 2384.606545][T10207] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:22:10 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000001700)={[{@resize='resize'}, {@resize='resize'}, {@resize_size={'resize'}}, {@discard_size={'discard', 0x3d, 0x200}}, {@iocharset={'iocharset', 0x3d, 'macroman'}}, {@resize_size={'resize', 0x3d, 0x400}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@euid_eq={'euid'}}], 0xfdfdffff}) 04:22:10 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x8035, 0x0, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:10 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000000)={0x6, 0x10000000000000}) r1 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x9, 0x40000) ioctl$SG_GET_PACK_ID(r1, 0x227c, &(0x7f00000000c0)) 04:22:10 executing program 1: r0 = socket$inet(0x2, 0x4000000000000004, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80000400200007fe, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) r1 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vga_arbiter\x00', 0x2400, 0x0) ioctl$TIOCGPTPEER(r1, 0x5441, 0x101) r2 = mmap$binder(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x2000001, 0x80010, r1, 0x0) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/thread-self/attr/current\x00', 0x2, 0x0) r3 = mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x4, 0x8011, r1, 0x0) ioctl$BINDER_WRITE_READ(r1, 0xc0306201, &(0x7f0000000300)={0x84, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="07630440030000000e630c4003000000020000000000000000634040000000000000000003000000000000000000000011000000000000000000000050000000000000003000000000000000", @ANYPTR=&(0x7f00000000c0)=ANY=[@ANYBLOB="852a6a7700010000", @ANYRES64=r2, @ANYBLOB="0000000000000000852a646600000000", @ANYRES32=r1, @ANYBLOB="000000000300d207610f12000000000a00000000f4fffd03000000000000001618000000000000"], @ANYPTR=&(0x7f0000000140)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00h\x00\x00\x00\x00\x00\x00\x00@\x00\x00\x00\x00\x00\x00\x00 \x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00 \x00\x00\x00\x00\x00\x00\x00'], @ANYBLOB="0d6300000e630c2b00000000040000000000000009631040", @ANYRES64=r3, @ANYBLOB="0400000000000000"], 0x98, 0x0, &(0x7f0000000240)="3a5081b7fc9976d81d81e370d9f3c6f4c4b62499f32a00e1bcec58b20ae1282c6c44e488aaec9222d3886a1c215df22ee8d7b196a725a1a410a282351e46966ab96b24f01ca65e4fe05988b73503ba8f422423f68e19eb5ba636bc33df1217767b34b9abdf61549e16815cf60f35f537a006ab5eadf279cddadb4f036036a405ba8b6146cfc0c201c8a085b4fe47475a6683d9ebbe66b5b2"}) lsetxattr(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)=@random={'btrfs.', 'smackfsfloor'}, &(0x7f0000000580)=',6\x00', 0x3, 0x0) mount$9p_rdma(&(0x7f0000000180)='127.0.0.1\x00', &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)='9p\x00', 0x800, &(0x7f0000000400)={'trans=rdma,', {'port', 0x3d, 0x4e21}, 0x2c, {[{@common=@debug={'debug', 0x3d, 0xffffffffffffffff}}, {@timeout={'timeout', 0x3d, 0x3e612399}}, {@rq={'rq', 0x3d, 0x7f}}, {@sq={'sq', 0x3d, 0x1}}, {@timeout={'timeout', 0x3d, 0x6}}, {@common=@nodevmap='nodevmap'}, {@rq={'rq', 0x3d, 0xfff}}], [{@smackfsfloor={'smackfsfloor', 0x3d, '/dev/vga_arbiter\x00'}}]}}) bind$inet(r0, &(0x7f0000000000), 0x10) 04:22:10 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x23000000, 0x0, 0x0, 0x0) 04:22:10 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x6488}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:10 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000000)={0x6}) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000100)='/dev/dlm_plock\x00', 0x28100, 0x0) r2 = syz_genetlink_get_family_id$nbd(&(0x7f0000000180)='nbd\x00') sendmsg$NBD_CMD_RECONFIGURE(r1, &(0x7f0000000240)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x20, r2, 0x102, 0x70bd26, 0x25dfdbfb, {}, [@NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x4}]}, 0x20}, 0x1, 0x0, 0x0, 0x20000000}, 0x10) prctl$PR_SET_THP_DISABLE(0x29, 0x0) r3 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x4, 0x0) setsockopt$inet6_tcp_TLS_RX(r3, 0x6, 0x2, &(0x7f00000000c0), 0x4) 04:22:10 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x8100, 0x0, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:10 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x800e}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) [ 2384.832333][T10242] JFS: Cannot determine volume size [ 2384.837576][T10242] JFS: Cannot determine volume size [ 2384.869083][T10242] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:22:10 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) getresuid(&(0x7f0000000080)=0x0, &(0x7f00000000c0), &(0x7f0000000100)) setuid(r1) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000000)={0x6}) 04:22:10 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3f000000, 0x0, 0x0, 0x0) 04:22:10 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x8847, 0x0, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2384.935104][T10242] JFS: Cannot determine volume size [ 2384.969059][T10242] JFS: Cannot determine volume size [ 2384.974333][T10242] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:22:10 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000001700)={[{@resize='resize'}, {@resize='resize'}, {@resize_size={'resize'}}, {@discard_size={'discard', 0x3d, 0x200}}, {@iocharset={'iocharset', 0x3d, 'macroman'}}, {@resize_size={'resize', 0x3d, 0x400}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@euid_eq={'euid'}}], 0xfffffdf9}) 04:22:10 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80000400200007fe, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) bind$inet(r0, &(0x7f0000000000), 0x10) getsockopt$inet_buf(r0, 0x0, 0x0, &(0x7f00000000c0)=""/4096, &(0x7f0000000040)=0x1000) 04:22:10 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x40000000, 0x0, 0x0, 0x0) 04:22:10 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x8035}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:10 executing program 3: syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) 04:22:10 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x8848, 0x0, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:10 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80000400200007fe, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) bind$inet(r0, &(0x7f0000000000), 0x10) getsockopt$inet_sctp6_SCTP_ENABLE_STREAM_RESET(0xffffffffffffffff, 0x84, 0x76, &(0x7f0000000040)={0x0, 0x4}, &(0x7f00000000c0)=0x8) setsockopt$inet_sctp_SCTP_PR_SUPPORTED(r0, 0x84, 0x71, &(0x7f0000000100)={r1, 0x2d48}, 0x8) 04:22:10 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x1a9894ff8035856e) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000000)={0x6}) 04:22:10 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x8864, 0x0, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:10 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x8100}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) [ 2385.230037][T10281] JFS: Cannot determine volume size 04:22:10 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x48000000, 0x0, 0x0, 0x0) [ 2385.251371][T10281] JFS: Cannot determine volume size [ 2385.266880][T10281] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:22:10 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x8906, 0x0, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2385.368270][T10281] JFS: Cannot determine volume size [ 2385.379238][T10281] JFS: Cannot determine volume size [ 2385.394757][T10281] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:22:11 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000001700)={[{@resize='resize'}, {@resize='resize'}, {@resize_size={'resize'}}, {@discard_size={'discard', 0x3d, 0x200}}, {@iocharset={'iocharset', 0x3d, 'macroman'}}, {@resize_size={'resize', 0x3d, 0x400}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@euid_eq={'euid'}}], 0xfffffdfc}) 04:22:11 executing program 3: r0 = accept4(0xffffffffffffff9c, 0x0, &(0x7f0000000100), 0x80000) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r0, 0x6, 0x1d, &(0x7f0000000140), &(0x7f0000000180)=0x14) r1 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_CAP(r1, 0xc010640c, &(0x7f0000000000)={0x6}) splice(r1, &(0x7f00000001c0), r1, &(0x7f00000000c0), 0x7f, 0x4) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x80080, 0x0) ioctl$SCSI_IOCTL_STOP_UNIT(r2, 0x6) 04:22:11 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x4c000000, 0x0, 0x0, 0x0) 04:22:11 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x8847}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:11 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80000400200007fe, &(0x7f0000000040)={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) bind$inet(r0, &(0x7f0000000000), 0x10) socket$inet(0x2, 0xa, 0x5) 04:22:11 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0xf000, 0x0, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:11 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x64f, 0x4000) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000000)={0xa, 0x2}) 04:22:11 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0xf0ffff, 0x0, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:11 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x8848}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:11 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x68000000, 0x0, 0x0, 0x0) [ 2385.581365][T10310] JFS: Cannot determine volume size 04:22:11 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x1000000, 0x0, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:11 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x8864}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) [ 2385.626906][T10310] JFS: Cannot determine volume size [ 2385.644878][T10310] jfs: Unrecognized mount option "fscontext=system_u" or missing value [ 2385.741505][T10310] JFS: Cannot determine volume size [ 2385.746781][T10310] JFS: Cannot determine volume size [ 2385.754247][T10310] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:22:11 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000001700)={[{@resize='resize'}, {@resize='resize'}, {@resize_size={'resize'}}, {@discard_size={'discard', 0x3d, 0x200}}, {@iocharset={'iocharset', 0x3d, 'macroman'}}, {@resize_size={'resize', 0x3d, 0x400}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@euid_eq={'euid'}}], 0xfffffdfd}) 04:22:11 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6c000000, 0x0, 0x0, 0x0) 04:22:11 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) r1 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-monitor\x00', 0x400, 0x0) setsockopt$inet_sctp_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f00000000c0)=[@in6={0xa, 0x4e21, 0x2, @local}, @in={0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}, @in={0x2, 0x4e22, @multicast1}, @in6={0xa, 0x4e23, 0x245ca1d6, @mcast2, 0x7}], 0x58) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000140)={0x6}) 04:22:11 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80000400200007fe, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) getsockopt$inet_sctp_SCTP_MAXSEG(r0, 0x84, 0xd, &(0x7f0000000040)=@assoc_value={0x0, 0x4}, &(0x7f00000000c0)=0x8) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(r0, 0x84, 0x1a, &(0x7f0000000100)={r1, 0x62, "df5b79a9c1aca14e9a7dcb954c2267b396dee9a3edb115597c0f7dc1bf3fa569c57fdf06a664dc265c209e3f3a032fb6b2716150865343137983cf948bda8a6229363138bd2db0d37844aeb3c89af150896f68692f2e5a5831e2d5b574bb04b15ef6"}, &(0x7f0000000180)=0x6a) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e20, @broadcast}, 0x10) 04:22:11 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x2000000, 0x0, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:11 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x8906}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:11 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x3000000, 0x0, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:11 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x74000000, 0x0, 0x0, 0x0) 04:22:11 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0xf000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:11 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000000)={0x6}) [ 2385.961027][T10340] JFS: Cannot determine volume size 04:22:11 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) socket$inet6_dccp(0xa, 0x6, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80000400200007fe, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) bind$inet(r0, &(0x7f0000000000), 0x10) [ 2385.986205][T10340] JFS: Cannot determine volume size 04:22:11 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7a000000, 0x0, 0x0, 0x0) [ 2386.013327][T10340] jfs: Unrecognized mount option "fscontext=system_u" or missing value [ 2386.118642][T10340] JFS: Cannot determine volume size [ 2386.133209][T10340] JFS: Cannot determine volume size [ 2386.138540][T10340] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:22:11 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000001700)={[{@resize='resize'}, {@resize='resize'}, {@resize_size={'resize'}}, {@discard_size={'discard', 0x3d, 0x200}}, {@iocharset={'iocharset', 0x3d, 'macroman'}}, {@resize_size={'resize', 0x3d, 0x400}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@euid_eq={'euid'}}], 0xffffff7f}) 04:22:11 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x6000000, 0x0, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:11 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0xf0ffff}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:11 executing program 3: r0 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0xfff, 0x10001) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r0, 0x4008240b, &(0x7f00000000c0)={0x7, 0x70, 0xffffffffffffffc1, 0x2, 0x1, 0x3ff, 0x0, 0x2, 0x2, 0x2, 0x4a3, 0xba, 0x3bc, 0x4, 0x10001, 0x80000000, 0x3, 0x7fffffff, 0x2, 0xffffffffffff0001, 0xfffffffffffffffd, 0x8, 0x1000, 0xe471, 0xffffffffffffff01, 0x1f, 0x1, 0x1, 0x7, 0x3, 0x35, 0x8, 0xffffffffffffffff, 0x7, 0x2, 0xffff, 0x8, 0x0, 0x0, 0x9ecd, 0x0, @perf_config_ext={0x5, 0x800}, 0x10, 0x8000, 0x3, 0xd, 0xff, 0x7f, 0x1}) r1 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0xfffffffffffffffd, 0x48000) ioctl$DRM_IOCTL_GET_CAP(r1, 0xc010640c, &(0x7f0000000000)={0x6}) 04:22:11 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x8cffffff, 0x0, 0x0, 0x0) 04:22:11 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xce5186c2e47bc6ee, 0x400200007fe, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0xffffff02) bind$inet(r0, &(0x7f0000000000), 0x10) 04:22:11 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f00000000c0)={0x1, 0x3}) ioctl$DRM_IOCTL_MODE_SETCRTC(r0, 0xc06864a2, &(0x7f0000000140)={&(0x7f0000000100)=[0x8], 0x1, 0x9, 0x7fffffff, 0x7, 0xfffffffffffffffc, 0xe41, {0x7, 0x1, 0x2, 0x2, 0x0, 0x10000, 0x9, 0x10000, 0x7fffffff, 0xffff, 0x81, 0x8000, 0x1, 0x11, "cec5b816ac159eb24bdea9ff20b36c30ba4be812f2eaeba983356dd47d2f5c3f"}}) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rfkill\x00', 0x80000, 0x0) ioctl$EVIOCGSND(r1, 0x8040451a, &(0x7f0000000080)=""/40) 04:22:11 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x1000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:11 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, &(0x7f00000000c0)="314541f395e7793c67a5f7b7315d40095ca95b72649d2f34f89bfa9d6cff20e5b185bfa7372ace675d698456a69657b919d73ca31ecca0be9704af77b46a225c0daa662b4508d630f0b273ee0fbf560f549c4c4fbabc12b8f2507a7a1aaea8eb764676b633c09278ae", 0x69, 0x80, &(0x7f0000000040)={0x2, 0x4e20, @empty}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x80000400200007fe, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) sigaltstack(&(0x7f0000ffb000/0x4000)=nil, &(0x7f0000000140)) bind$inet(r0, &(0x7f0000000000), 0x10) [ 2386.332523][T10367] JFS: Cannot determine volume size 04:22:11 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x7000000, 0x0, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:11 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xc0ed0000, 0x0, 0x0, 0x0) [ 2386.388427][T10367] JFS: Cannot determine volume size 04:22:11 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x400, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80000400200007fe, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) bind$inet(r0, &(0x7f0000000000), 0x10) [ 2386.429085][T10367] jfs: Unrecognized mount option "fscontext=system_u" or missing value [ 2386.507119][T10367] JFS: Cannot determine volume size [ 2386.522797][T10367] JFS: Cannot determine volume size [ 2386.547077][T10367] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:22:12 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000001700)={[{@resize='resize'}, {@resize='resize'}, {@resize_size={'resize'}}, {@discard_size={'discard', 0x3d, 0x200}}, {@iocharset={'iocharset', 0x3d, 'macroman'}}, {@resize_size={'resize', 0x3d, 0x400}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@euid_eq={'euid'}}], 0xffffff8c}) 04:22:12 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xf4ffffff, 0x0, 0x0, 0x0) 04:22:12 executing program 3: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0xa8, 0x41) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000000)={0x6}) r1 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r1, 0x0, 0x40, &(0x7f0000000180)={'mangle\x00\x02\x00\x00\x00\x00\b\xca\n\x00\x00\x00\x00\x00\x00\x00\x00\x01\x01\xf1\xff\x00\x00\x00\x00\x02'}, &(0x7f0000000200)=0x54) 04:22:12 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x8000000, 0x0, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:12 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x2000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:12 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80000400200007fe, &(0x7f0000000080)={0x2, 0x4e24, @local}, 0x2a7) bind$inet(r0, &(0x7f0000000000), 0x10) 04:22:12 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xf5ffffff, 0x0, 0x0, 0x0) 04:22:12 executing program 3: syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000000)='/dev/snd/pcmC#D#c\x00', 0x1ff, 0x80) r1 = syz_open_dev$dmmidi(&(0x7f00000000c0)='/dev/dmmidi#\x00', 0x4, 0x800) renameat(r0, &(0x7f0000000080)='./file0\x00', r1, &(0x7f0000000100)='./file0\x00') 04:22:12 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x3000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:12 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x8060000, 0x0, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2386.734063][T10399] JFS: Cannot determine volume size 04:22:12 executing program 1: r0 = socket$inet(0x2, 0x80000, 0x0) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000040)) sendto$inet(r0, 0x0, 0x0, 0x80000400200007fe, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) bind$inet(r0, &(0x7f0000000000), 0x10) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) ioctl$IOC_PR_CLEAR(r1, 0x401070cd, &(0x7f0000000100)={0x3}) [ 2386.772415][T10399] JFS: Cannot determine volume size 04:22:12 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xf6ffffff, 0x0, 0x0, 0x0) [ 2386.804737][T10399] jfs: Unrecognized mount option "fscontext=system_u" or missing value [ 2386.894426][T10399] JFS: Cannot determine volume size [ 2386.909450][T10399] JFS: Cannot determine volume size [ 2386.932733][T10399] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:22:12 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000001700)={[{@resize='resize'}, {@resize='resize'}, {@resize_size={'resize'}}, {@discard_size={'discard', 0x3d, 0x200}}, {@iocharset={'iocharset', 0x3d, 'macroman'}}, {@resize_size={'resize', 0x3d, 0x400}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@euid_eq={'euid'}}], 0xfffffff6}) 04:22:12 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000140)='/dev/dri/card#\x00', 0x200000000005, 0x100) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000000)={0x6, 0x8000000000}) r1 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x10001, 0x400000) write$P9_RSTAT(r1, &(0x7f0000000080)={0x5f, 0x7d, 0x2, {0x0, 0x58, 0x2, 0x7, {0x0, 0x4, 0x3}, 0x200000, 0x800, 0x9, 0x3ff, 0x1, '-', 0x0, '', 0x15, 'ppp1posix_acl_access\x00', 0xf, '/dev/dri/card#\x00'}}, 0x5f) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f0000000180)={0x5, &(0x7f0000000100)=[{0x0, 0x8, 0x20, 0x9}, {0x120e, 0xffff, 0x7ff, 0x62}, {0x91, 0x3, 0xcf, 0x9}, {0xffff, 0x7, 0xfff, 0x2}, {0x7d, 0x80000000, 0x6, 0x81}]}, 0x10) 04:22:12 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0xd000000, 0x0, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:12 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x4000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:12 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xf9fdffff, 0x0, 0x0, 0x0) 04:22:12 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80000400200007fe, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) bind$inet(r0, &(0x7f0000000000), 0x10) select(0x40, &(0x7f0000000040)={0xf5, 0x8, 0x3ff, 0x9, 0x1f, 0x8, 0x1, 0x2}, &(0x7f00000000c0)={0x7, 0x7fffffff, 0x61, 0x101, 0x100000001, 0x5, 0x2, 0x5}, &(0x7f0000000100)={0x10000, 0x53, 0x191, 0xff, 0x82c, 0x7fffffff, 0x100, 0x5fa1}, &(0x7f0000000140)={0x77359400}) 04:22:12 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xfbffffff, 0x0, 0x0, 0x0) 04:22:12 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x6000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:12 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x10000000, 0x0, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:12 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000240)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000000)={0x6, 0x8000000000000}) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000200)={0x147d, 0x718, 0x98, &(0x7f0000000140)="097d2c371c0d10bc707d2ac20d3d85196205973522a3d1ac939634cd9ed0da6720e58b154552484223ccb44d6a2dc09954b4a57d434b97d6bde49b4256a01260180365a628c60f052fea3c1fa4bfe48b5af325a3a6df115be5ccef9bd41371f60be06285e036a237a29b02df128ec90e7b776e32f7cd4539227f5c35e23c69ac8f2b631f4f44f911ed85fe5122b1e689ed42cfb69ce89358"}) ioctl$DRM_IOCTL_FREE_BUFS(r0, 0x4010641a, &(0x7f00000000c0)={0x5, &(0x7f0000000080)=[0xffff, 0x1, 0x1000, 0x1, 0x1]}) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x311000, 0x0) write$sndseq(r1, &(0x7f0000000380)=[{0x6c04, 0x1f, 0xfff, 0x1, @tick, {0x5, 0xffff}, {0xffff, 0x80000000}, @raw8={"95d75ce6f2d7f740370100a2"}}, {0x8, 0xba0, 0x10000, 0x6, @tick=0x77, {0xaa1, 0x12}, {0x7f, 0xffffffffaba9d138}, @ext={0xda, &(0x7f0000000280)="0441c9b8c4841fff37ac9192cb37fd790ce05ba0d5434b506de3b1402a2584061ff23a3bb809e63d27da7579ae1457151e185fa2fea3c7648176d4acd65ae8736f49190cdacd6ec166a8f77b67f124907b56dad4807b244589fde95bff8cbf3fc8e4383526aeb9b08584205f74458be579eae6a58dd093d44e6e4093b81035b006ad4421cd0ce705e01f2c702a3ea03751bc6383b836a925660dfbe32d66156da762bcefc1d6c1e522d0e9901acece6bd167026857503618c621c6aee55ba2bccd07accf1739477d89b5450f828c4f335a1694fd25f28deaacab"}}, {0x8000, 0x7, 0x3, 0xfc1, @tick=0x7, {0x7f, 0x6}, {0x8, 0x800}, @raw32={[0x6, 0x7, 0x1]}}, {0x3, 0x5bfd, 0x4, 0x7, @tick=0x101, {0x5, 0x7ba4}, {0x6, 0x8}, @time=@time={0x0, 0x989680}}, {0x1000, 0x4, 0xabf, 0x6, @tick=0x6, {0x0, 0x1}, {0x40, 0x7}, @result={0x40, 0x9}}, {0x1, 0x106, 0xf65, 0xfffffffffffffffa, @tick=0x3f, {0x100}, {0x8, 0x1ff}, @note={0x0, 0x3, 0x2, 0x401, 0x1}}, {0x2ad3, 0x5, 0x1ffe, 0x3ff, @time={0x77359400}, {0x80, 0x39f712c4}, {0x9}, @raw32={[0x2, 0x7, 0x8]}}], 0x150) syz_open_dev$sndseq(&(0x7f0000000100)='/dev/snd/seq\x00', 0x0, 0x202) 04:22:12 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f0000000140)={{0x2, 0x4e20, @rand_addr=0x200}, {0x7, @local}, 0x4, {0x2, 0x4e22, @rand_addr=0x1}, 'ipddp0\x00'}) sendto$inet(r0, 0x0, 0x0, 0x80000400200007fe, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) bind$inet(r0, &(0x7f0000000000), 0x10) [ 2387.162064][T10435] JFS: Cannot determine volume size [ 2387.167332][T10435] JFS: Cannot determine volume size 04:22:12 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xfcfdffff, 0x0, 0x0, 0x0) [ 2387.239050][T10435] jfs: Unrecognized mount option "fscontext=system_u" or missing value [ 2387.309387][T10435] JFS: Cannot determine volume size [ 2387.314771][T10435] JFS: Cannot determine volume size [ 2387.340942][T10435] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:22:12 executing program 3: r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x40) ioctl$DRM_IOCTL_RES_CTX(0xffffffffffffffff, 0xc0106426, &(0x7f0000000100)={0x2, &(0x7f00000000c0)=[{0x0}, {}]}) ioctl$DRM_IOCTL_SET_SAREA_CTX(r0, 0x4010641c, &(0x7f0000000240)={r1, &(0x7f0000000280)=""/150}) r2 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_CAP(r2, 0xc010640c, &(0x7f0000000000)={0x6}) 04:22:12 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x14000000, 0x0, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:12 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x7000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:12 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000001700)={[{@resize='resize'}, {@resize='resize'}, {@resize_size={'resize'}}, {@discard_size={'discard', 0x3d, 0x200}}, {@iocharset={'iocharset', 0x3d, 'macroman'}}, {@resize_size={'resize', 0x3d, 0x400}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@euid_eq={'euid'}}], 0x1000000000}) 04:22:12 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xfdfdffff, 0x0, 0x0, 0x0) 04:22:12 executing program 1: r0 = syz_open_dev$admmidi(&(0x7f0000000140)='/dev/admmidi#\x00', 0xffffffffffffff15, 0x203) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000180)=ANY=[@ANYRES32=0x0, @ANYBLOB="89000500"], &(0x7f00000001c0)=0x8) setsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(r0, 0x84, 0x9, &(0x7f0000000200)={r1, @in={{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x24}}}, 0xffff, 0x2, 0x9, 0x7ff, 0x1}, 0x98) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r2, 0x0, 0x0, 0x80000400200007fe, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) r3 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x100000001, 0x100) setsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f00000002c0)={r1, 0x3}, 0x8) dup2(r0, r3) ioctl$DRM_IOCTL_GET_MAP(r3, 0xc0286404, &(0x7f00000000c0)={&(0x7f0000ffd000/0x3000)=nil, 0x0, 0x7, 0x2, &(0x7f0000ffe000/0x2000)=nil, 0x6}) socket$can_raw(0x1d, 0x3, 0x1) bind$inet(r2, &(0x7f0000000000), 0x10) ioctl$SG_GET_SCSI_ID(r3, 0x2276, &(0x7f0000000100)) 04:22:13 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x20000000, 0x0, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:13 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xfeffffff, 0x0, 0x0, 0x0) 04:22:13 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x8000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:13 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80000400200007fe, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) ioctl$VHOST_SET_VRING_ENDIAN(r0, 0x4008af13, &(0x7f00000000c0)={0x2, 0x1000}) syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x835, 0x0) bind$inet(r0, &(0x7f0000000000), 0x10) [ 2387.555372][T10464] JFS: Cannot determine volume size 04:22:13 executing program 3: r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20ncci\x00', 0x40000, 0x0) write$binfmt_elf32(r0, &(0x7f0000000640)={{0x7f, 0x45, 0x4c, 0x46, 0x400, 0x16fb, 0x100, 0x20, 0x8ce, 0x3, 0x6, 0x1000, 0x3a3, 0x38, 0x36a, 0x1, 0x7fff, 0x20, 0x1, 0xbe1, 0x7, 0x1000}, [{0x5, 0x7, 0x9, 0x40100000000, 0x47, 0x5, 0xffffffffffffffff}], "8202b1be405a6b3116842437070791", [[], [], [], [], []]}, 0x567) r1 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_CAP(r1, 0xc010640c, &(0x7f0000000000)={0x6}) [ 2387.606639][T10464] JFS: Cannot determine volume size 04:22:13 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x28000000, 0x0, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:13 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x8060000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) [ 2387.641116][T10464] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:22:13 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000080)='/dev/usbmon#\x00', 0x3f, 0x182) connect$pptp(r0, &(0x7f00000000c0)={0x18, 0x2, {0x2, @rand_addr=0x7}}, 0x1e) r1 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_CAP(r1, 0xc010640c, &(0x7f0000000000)={0x6}) 04:22:13 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x3f000000, 0x0, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2387.720936][T10464] JFS: Cannot determine volume size [ 2387.726188][T10464] JFS: Cannot determine volume size [ 2387.737336][T10464] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:22:13 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000001700)={[{@resize='resize'}, {@resize='resize'}, {@resize_size={'resize'}}, {@discard_size={'discard', 0x3d, 0x200}}, {@iocharset={'iocharset', 0x3d, 'macroman'}}, {@resize_size={'resize', 0x3d, 0x400}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@euid_eq={'euid'}}], 0xedc000000000}) 04:22:13 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xff0f0000, 0x0, 0x0, 0x0) 04:22:13 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80000400200007fe, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000040)) bind$inet(r0, &(0x7f0000000000), 0x10) r1 = syz_open_dev$usb(&(0x7f00000000c0)='/dev/bus/usb/00#/00#\x00', 0x4, 0x448800) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_FLUSH(r1, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x400008}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x90, r2, 0x10, 0x10000, 0x25dfdbfe, {}, [@IPVS_CMD_ATTR_DEST={0x54, 0x2, [@IPVS_DEST_ATTR_PORT={0x8, 0x2, 0x4e22}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0xce91}, @IPVS_DEST_ATTR_FWD_METHOD={0x8}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0xffffffffffffff81}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x5}, @IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x4}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x9}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x1}, @IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0x6}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x44ab}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8}, @IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x2f}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}]}]}, 0x90}, 0x1, 0x0, 0x0, 0x40}, 0x0) 04:22:13 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0xd000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:13 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000000)={0x6}) r1 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_SET_NETID(r0, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x180000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x24, r1, 0x410, 0x70bd27, 0x25dfdbfd, {{}, 0x0, 0x800b, 0x0, {0x8, 0x2, 0x2}}, ["", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x81}, 0x4000840) sendfile(r0, r0, &(0x7f0000000080), 0x0) r2 = syz_open_dev$dmmidi(&(0x7f0000000200)='/dev/dmmidi#\x00', 0x6, 0x0) setsockopt$IP_VS_SO_SET_ZERO(r2, 0x0, 0x48f, &(0x7f0000000240)={0x0, @initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e22, 0x4, 'lc\x00', 0x20, 0x0, 0x4}, 0x2c) 04:22:13 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x40000000, 0x0, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:13 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xfffffdf9, 0x0, 0x0, 0x0) 04:22:13 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x10000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:13 executing program 3: r0 = openat$vimc0(0xffffffffffffff9c, &(0x7f0000000080)='/dev/video0\x00', 0x2, 0x0) ioctl$VIDIOC_SUBDEV_G_FMT(r0, 0xc0585604, &(0x7f00000000c0)={0x1, 0x0, {0x7fff, 0x7fffffff, 0x2008, 0x2, 0x9, 0x2, 0x2}}) r1 = syz_open_dev$audion(&(0x7f0000000140)='/dev/audio#\x00', 0x1000, 0x200) ioctl$KDGKBMETA(r1, 0x4b62, &(0x7f0000000240)) r2 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_CAP(r2, 0xc010640c, &(0x7f0000000000)={0x6}) syz_open_dev$audion(&(0x7f00000001c0)='/dev/audio#\x00', 0x1, 0x2000) 04:22:13 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80000400200007fe, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4}, 0x10) [ 2388.001043][T10502] JFS: Cannot determine volume size 04:22:13 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x43050000, 0x0, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:13 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x11000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) [ 2388.027128][T10502] JFS: Cannot determine volume size [ 2388.045547][T10502] jfs: Unrecognized mount option "fscontext=system_u" or missing value [ 2388.136617][T10502] JFS: Cannot determine volume size [ 2388.164209][T10502] JFS: Cannot determine volume size [ 2388.170816][T10502] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:22:13 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000001700)={[{@resize='resize'}, {@resize='resize'}, {@resize_size={'resize'}}, {@discard_size={'discard', 0x3d, 0x200}}, {@iocharset={'iocharset', 0x3d, 'macroman'}}, {@resize_size={'resize', 0x3d, 0x400}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@euid_eq={'euid'}}], 0x40000000000000}) 04:22:13 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80000400200007fe, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e24, @broadcast}, 0x10) 04:22:13 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xfffffdfc, 0x0, 0x0, 0x0) 04:22:13 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000000140)={0x6, &(0x7f0000000100)=[{0x5, 0x3, 0x40000000000, 0x9}, {0x74, 0x8, 0x1ff, 0x8}, {0x7, 0x9, 0x6, 0x100000000}, {0xac, 0xfffffffffffffff7, 0xfffffffffffffff8, 0x9}, {0x3, 0x4, 0x65, 0x7}, {0x1, 0x6, 0x6, 0x4}]}, 0xfffffe2c) r1 = syz_open_dev$sndctrl(&(0x7f0000000000)='/dev/snd/controlC#\x00', 0x2, 0x0) ioctl$SNDRV_CTL_IOCTL_RAWMIDI_INFO(r1, 0x80045530, &(0x7f00000000c0)) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000000)={0x6}) pipe(&(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$FS_IOC_SETFSLABEL(r2, 0x41009432, &(0x7f0000000180)="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") ioctl$EXT4_IOC_SETFLAGS(r2, 0x40086602, &(0x7f00000000c0)=0x20000000) 04:22:13 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x800e0000, 0x0, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:13 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x14000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:13 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xfffffdfd, 0x0, 0x0, 0x0) 04:22:13 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) connect$inet(r0, &(0x7f0000000040)={0x2, 0x4e21, @multicast1}, 0x10) r1 = openat$null(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/null\x00', 0x101000, 0x0) write$vhci(r1, &(0x7f00000002c0)=@HCI_SCODATA_PKT={0x3, "fda74d82c13ca77eb47db276db565226924e16b94175fbde8999964853ac17d25c1c43184b91909a0ccbb2155225edc5"}, 0xffffff91) sendto$inet(r0, 0x0, 0x0, 0x80000400200007fe, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) bind$inet(r0, &(0x7f0000000000), 0x10) ioctl$FIDEDUPERANGE(r1, 0xc0189436, &(0x7f0000000200)={0x7ff, 0x8000, 0x1, 0x0, 0x0, [{r0, 0x0, 0x9}]}) 04:22:13 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x1c000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:13 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x80350000, 0x0, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2388.384116][T10531] JFS: Cannot determine volume size 04:22:13 executing program 3: r0 = syz_open_dev$adsp(&(0x7f0000000040)='/dev/adsp#\x00', 0x7, 0x80000) connect$rose(r0, &(0x7f0000000080)=@short={0xb, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x1, @bcast}, 0x1c) r1 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x6, 0x4c3) ioctl$DRM_IOCTL_GET_CAP(r1, 0xc010640c, &(0x7f0000000000)={0x6}) socket$bt_rfcomm(0x1f, 0x1, 0x3) 04:22:13 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xffffff7f, 0x0, 0x0, 0x0) [ 2388.420181][T10531] JFS: Cannot determine volume size [ 2388.436626][T10531] jfs: Unrecognized mount option "fscontext=system_u" or missing value [ 2388.537706][T10531] JFS: Cannot determine volume size [ 2388.549811][T10531] JFS: Cannot determine volume size [ 2388.569899][T10531] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:22:14 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000001700)={[{@resize='resize'}, {@resize='resize'}, {@resize_size={'resize'}}, {@discard_size={'discard', 0x3d, 0x200}}, {@iocharset={'iocharset', 0x3d, 'macroman'}}, {@resize_size={'resize', 0x3d, 0x400}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@euid_eq={'euid'}}], 0x100000000000000}) 04:22:14 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x20000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:14 executing program 1: syz_open_dev$loop(&(0x7f0000000040)='/dev/loop#\x00', 0x6, 0x80000) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80000400200007fe, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) bind$inet(r0, &(0x7f0000000000), 0x10) 04:22:14 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x81000000, 0x0, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:14 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000000)={0x6}) r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x8, 0x14000) getsockopt$inet_sctp6_SCTP_PEER_ADDR_THLDS(0xffffffffffffff9c, 0x84, 0x1f, &(0x7f00000000c0)={0x0, @in={{0x2, 0x4e20, @rand_addr=0x2}}, 0x373, 0x80000000}, &(0x7f0000000180)=0x90) setsockopt$inet_sctp6_SCTP_ADD_STREAMS(r1, 0x84, 0x79, &(0x7f00000001c0)={r2, 0x9, 0x6}, 0x8) 04:22:14 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xffffff8c, 0x0, 0x0, 0x0) 04:22:14 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x86ddffff, 0x0, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:14 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x3f000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:14 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xfffffff4, 0x0, 0x0, 0x0) 04:22:14 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000100)={0x6}) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000000)='/dev/dsp\x00', 0x80000, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000180)='IPVS\x00') sendmsg$IPVS_CMD_NEW_SERVICE(r1, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0xa4, r2, 0x20, 0x70bd2d, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x8}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x3ff}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8}]}, @IPVS_CMD_ATTR_SERVICE={0x38, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x73142075}, @IPVS_SVC_ATTR_SCHED_NAME={0xc, 0x6, 'lblcr\x00'}, @IPVS_SVC_ATTR_FWMARK={0x8}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x2}, @IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'sed\x00'}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x3f}]}, @IPVS_CMD_ATTR_DAEMON={0x34, 0x3, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x3}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x2}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0xfffffffffffffff9}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x30}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x8, 0x7, 0x4e24}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x97d2}]}, 0xa4}, 0x1, 0x0, 0x0, 0x800}, 0x40040) r3 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x6000000, 0x361001) setsockopt$inet_tcp_TCP_REPAIR_WINDOW(r3, 0x6, 0x1d, &(0x7f00000000c0)={0x9, 0x1, 0x4, 0xfff, 0x1b8}, 0x14) 04:22:14 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x8000040020000802, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) bind$inet(r0, &(0x7f0000000080), 0x10) 04:22:14 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xfffffff5, 0x0, 0x0, 0x0) [ 2388.802090][T10561] JFS: Cannot determine volume size [ 2388.807334][T10561] JFS: Cannot determine volume size [ 2388.874126][T10561] jfs: Unrecognized mount option "fscontext=system_u" or missing value [ 2388.942316][T10561] JFS: Cannot determine volume size [ 2388.959202][T10561] JFS: Cannot determine volume size [ 2388.971271][T10561] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:22:14 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000001700)={[{@resize='resize'}, {@resize='resize'}, {@resize_size={'resize'}}, {@discard_size={'discard', 0x3d, 0x200}}, {@iocharset={'iocharset', 0x3d, 'macroman'}}, {@resize_size={'resize', 0x3d, 0x400}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@euid_eq={'euid'}}], 0x200000000000000}) 04:22:14 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x43050000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:14 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x88470000, 0x0, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:14 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000000)={0x6}) r1 = semget$private(0x0, 0x0, 0x4) semctl$SEM_STAT(r1, 0x6, 0x12, &(0x7f0000000080)=""/4096) r2 = syz_open_dev$dmmidi(&(0x7f0000001080)='/dev/dmmidi#\x00', 0x5, 0x2) ioctl$KVM_SET_PIT2(r2, 0x4070aea0, &(0x7f00000010c0)={[{0x1, 0x4, 0x3, 0x3, 0x7, 0xaf2, 0x5, 0x3f, 0xef9, 0x3ff, 0x4, 0xf61, 0xe5}, {0x8001, 0x100, 0x4, 0xf83, 0x9, 0xffff, 0x9, 0x10000, 0x7, 0xfffffffffffffffe, 0x9, 0x200, 0x89}, {0x30c0c00000000000, 0xb3b, 0x5, 0x3, 0x1, 0x1ff, 0xfffffffffffff2e0, 0x48de, 0x0, 0x6, 0x800, 0x1ff, 0x9}]}) readv(r2, &(0x7f00000022c0)=[{&(0x7f0000001140)=""/10, 0xa}, {&(0x7f0000001180)=""/184, 0xb8}, {&(0x7f0000001240)=""/4096, 0x1000}, {&(0x7f0000002240)=""/71, 0x47}], 0x4) 04:22:14 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x20400, 0x0) ioctl$PPPIOCSDEBUG(r1, 0x40047440, &(0x7f00000000c0)=0x458d) sendto$inet(r0, 0x0, 0xffffffffffffff7c, 0x80000400200007fe, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) setsockopt$IP_VS_SO_SET_STARTDAEMON(r0, 0x0, 0x48b, &(0x7f0000000100)={0x0, 'bridge_slave_0\x00', 0x1}, 0x18) bind$inet(r0, &(0x7f0000000000), 0x10) 04:22:14 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xfffffff6, 0x0, 0x0, 0x0) 04:22:14 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xfffffffb, 0x0, 0x0, 0x0) 04:22:14 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x88480000, 0x0, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:14 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x60000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:14 executing program 3: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x3, 0x40000000000001) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000000)={0x6}) 04:22:14 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80000400200007fe, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) [ 2389.176071][T10591] JFS: Cannot determine volume size 04:22:14 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xfffffffe, 0x0, 0x0, 0x0) [ 2389.213111][T10591] JFS: Cannot determine volume size [ 2389.229834][T10591] jfs: Unrecognized mount option "fscontext=system_u" or missing value [ 2389.298608][T10591] JFS: Cannot determine volume size [ 2389.318117][T10591] JFS: Cannot determine volume size [ 2389.345377][T10591] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:22:14 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000001700)={[{@resize='resize'}, {@resize='resize'}, {@resize_size={'resize'}}, {@discard_size={'discard', 0x3d, 0x200}}, {@iocharset={'iocharset', 0x3d, 'macroman'}}, {@resize_size={'resize', 0x3d, 0x400}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@euid_eq={'euid'}}], 0x300000000000000}) 04:22:14 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x88640000, 0x0, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:14 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000000)={0x6}) r1 = dup(r0) write$RDMA_USER_CM_CMD_CREATE_ID(r1, &(0x7f00000000c0)={0x0, 0x18, 0xfa00, {0x3, &(0x7f0000000080), 0x111, 0x4}}, 0x20) 04:22:14 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1000000000, 0x0, 0x0, 0x0) 04:22:14 executing program 1: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)=0x0) r1 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000000)='/proc/capi/capi20ncci\x00', 0x440000, 0x0) write$capi20(r1, &(0x7f00000000c0)={0x10, 0x1, 0x8e, 0x83, 0xfffffffffffffffe, 0x80}, 0x10) sched_getscheduler(r0) r2 = socket$inet(0x2, 0x4000000000000001, 0x4) sendto$inet(r2, 0x0, 0x0, 0x80000400200007fe, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) bind$inet(r2, &(0x7f0000000100), 0x10) 04:22:14 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x800e0000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:15 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x88a8ffff, 0x0, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:15 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xedc000000000, 0x0, 0x0, 0x0) 04:22:15 executing program 3: r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x400, 0x0) ioctl$DRM_IOCTL_CONTROL(r0, 0x40086414, &(0x7f00000000c0)={0x0, 0x1000}) r1 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_CAP(r1, 0xc010640c, &(0x7f0000000000)={0x6}) 04:22:15 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x80350000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) [ 2389.607713][T10622] JFS: Cannot determine volume size 04:22:15 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x88caffff, 0x0, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2389.662503][T10622] JFS: Cannot determine volume size 04:22:15 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x81000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) [ 2389.699211][T10622] jfs: Unrecognized mount option "fscontext=system_u" or missing value [ 2389.800560][T10622] JFS: Cannot determine volume size [ 2389.818978][T10622] JFS: Cannot determine volume size [ 2389.836303][T10622] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:22:15 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000001700)={[{@resize='resize'}, {@resize='resize'}, {@resize_size={'resize'}}, {@discard_size={'discard', 0x3d, 0x200}}, {@iocharset={'iocharset', 0x3d, 'macroman'}}, {@resize_size={'resize', 0x3d, 0x400}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@euid_eq={'euid'}}], 0x400000000000000}) 04:22:15 executing program 1: r0 = dup2(0xffffffffffffff9c, 0xffffffffffffffff) write$FUSE_DIRENT(r0, &(0x7f00000000c0)={0xe8, 0x0, 0x5, [{0x1, 0x1000, 0x1, 0xfffffffffffffffa, '}'}, {0x6, 0x401, 0x6, 0x5, 'vmnet1'}, {0x6, 0x0, 0x0, 0xe1ac}, {0x4, 0x7ff, 0x1, 0x1, '/'}, {0x5, 0x7fffffff, 0x1, 0x2e, '+'}, {0x0, 0x10001, 0x5, 0x7933669b, 'proc)'}, {0x5, 0x7, 0x4, 0x9, '#\'lo'}]}, 0xe8) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r1, 0x0, 0x0, 0x80000400200007fe, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) bind$inet(r1, &(0x7f0000000000), 0x10) 04:22:15 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$UFFDIO_COPY(r0, 0xc028aa03, &(0x7f0000000080)={&(0x7f0000ffe000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, 0x2000, 0x1}) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000000)={0x6}) 04:22:15 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1000000000000, 0x0, 0x0, 0x0) 04:22:15 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x89060000, 0x0, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:15 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x86ddffff}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:15 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7ffffffffffff, 0x0, 0x0, 0x0) 04:22:15 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0xffffa888, 0x0, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:15 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000000)={0x6}) syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x2, 0x40080) 04:22:15 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x88470000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:15 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = syz_open_dev$vbi(&(0x7f0000000100)='/dev/vbi#\x00', 0x0, 0x2) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TIMER(r1, 0x40605346, &(0x7f0000000140)={0x7fff, 0x1, {0x3, 0x0, 0x0, 0x2, 0x3f}}) ioctl$BINDER_SET_MAX_THREADS(r0, 0x40046205, 0x7) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f00000002c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="c400ffff0001010000000300d291e9077292d5367cb5507d0d8b3280502c0b699372bd018b5ca8957888969ffa4fe3803f1de23b66ac63677f7b0c80f41eb3a412dd0af554b51e30319e06015a75bc452e0dd264ed458394760b1e0c8f21c1aafed3d2a16d63a032e669323e8e4ec4921597dfeb02f535be93b4015878057b857bfda25f91f8a0d8d282e351bacab8c8adc88d141957860000000000000000000000000000"], &(0x7f0000000200)=0x10) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(r1, 0x84, 0x13, &(0x7f0000000240)={r2}, &(0x7f0000000280)=0x8) sendto$inet(r0, 0x0, 0x0, 0x80000400200007ff, &(0x7f0000000080)={0x2, 0x1, @local}, 0x7) r3 = syz_open_dev$sndpcmp(&(0x7f0000000040)='/dev/snd/pcmC#D#p\x00', 0x80000000, 0x0) getsockopt$inet_sctp_SCTP_ADAPTATION_LAYER(r1, 0x84, 0x7, &(0x7f00000003c0), &(0x7f0000000380)=0x4b) ioctl$TCSETSW(r1, 0x5403, &(0x7f00000001c0)={0x6, 0x0, 0x5, 0x100, 0xe, 0x4, 0x7, 0x2dc1, 0x2, 0x400, 0x9, 0x5}) ioctl$TIOCGLCKTRMIOS(r3, 0x5456, &(0x7f00000000c0)={0x4, 0x4, 0x8, 0x1ff, 0xa, 0x7, 0x9, 0xea0e, 0xa01, 0x6df2, 0x5, 0x7fffffff}) bind$inet(r0, &(0x7f0000000000), 0x10) [ 2390.124846][T10655] JFS: Cannot determine volume size 04:22:15 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x10000000000000, 0x0, 0x0, 0x0) [ 2390.184384][T10655] JFS: Cannot determine volume size [ 2390.221763][T10655] jfs: Unrecognized mount option "fscontext=system_u" or missing value [ 2390.285027][T10655] JFS: Cannot determine volume size [ 2390.290346][T10655] JFS: Cannot determine volume size [ 2390.290373][T10655] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:22:15 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000001700)={[{@resize='resize'}, {@resize='resize'}, {@resize_size={'resize'}}, {@discard_size={'discard', 0x3d, 0x200}}, {@iocharset={'iocharset', 0x3d, 'macroman'}}, {@resize_size={'resize', 0x3d, 0x400}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@euid_eq={'euid'}}], 0x500000000000000}) 04:22:15 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x2, 0xa040) bind$inet6(r0, 0x0, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x101000000000001, 0x4) mkdir(&(0x7f0000000700)='./file1\x00', 0x100) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c653100d5d909"]) setxattr$system_posix_acl(&(0x7f0000000300)='./file1/file0\x00', &(0x7f0000000380)='system.posix_acl_access\x00', &(0x7f0000000cc0)={{}, {}, [{}], {0x4, 0x5}, [{0x8, 0x4}, {0x8, 0x5}, {0x8, 0x1}]}, 0x44, 0x1) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) connect$inet6(r0, 0x0, 0x0) chdir(&(0x7f00000002c0)='./file0\x00') r2 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_CAP(r2, 0xc010640c, &(0x7f0000000000)={0x6}) ioctl$DRM_IOCTL_MODESET_CTL(r2, 0x40086408, &(0x7f0000000080)={0x3808, 0x1}) 04:22:15 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x88480000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:15 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0xffffca88, 0x0, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:15 executing program 1: sendto$inet(0xffffffffffffffff, 0x0, 0x0, 0x80000400200007fe, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) bind$inet(0xffffffffffffffff, &(0x7f0000000040), 0x10) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x8000, 0x0) getsockopt$IP6T_SO_GET_ENTRIES(r0, 0x29, 0x41, &(0x7f00000000c0)={'mangle\x00', 0xa1, "cc6f1183167986b6f7cebfb7a9b679c41f61415abe6b77238e1fdc44d13b86b3aaf48bcaaba4975de150c405ca1ed1635ea2a23c03a75c2a254645185f695e01faada3939d09115290ba317fcd70b49d5406c6d5b92d737c8aa7039f3342a57316d968d4ba597d25a2545252d4efece2894420db58605ccbcab2ab889f84370510255d809e2d215dabe4982863b2c06d52abba8d70669400366b4eb2bef2330408"}, &(0x7f00000001c0)=0xc5) 04:22:15 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x40000000000000, 0x0, 0x0, 0x0) 04:22:16 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0xffffdd86, 0x0, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:16 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80000400200007fe, &(0x7f0000000040)={0x2, 0x0, @rand_addr=0xff}, 0x2e4) bind$inet(r0, &(0x7f0000000000), 0x10) openat$fuse(0xffffffffffffff9c, &(0x7f0000000080)='/dev/fuse\x00', 0x2, 0x0) sendto$inet(r0, &(0x7f00000000c0)="6f2ab7afe16b0699c5012211b9233cc5b33fe55ec037901979d85d7857f5a90cf44841a7a7aa8ca61fbad3a12a56eb9254deb73052f93b3c3ba64b1dfa", 0x3d, 0x4040011, &(0x7f0000000100)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) 04:22:16 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x100000000000000, 0x0, 0x0, 0x0) 04:22:16 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x88640000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) [ 2390.544272][T10682] JFS: Cannot determine volume size [ 2390.583656][T10682] JFS: Cannot determine volume size 04:22:16 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x200000000000000, 0x0, 0x0, 0x0) [ 2390.610230][T10682] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:22:16 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0xfffff000, 0x0, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2390.707584][T10682] JFS: Cannot determine volume size [ 2390.741162][T10682] JFS: Cannot determine volume size [ 2390.764393][T10682] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:22:16 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000001700)={[{@resize='resize'}, {@resize='resize'}, {@resize_size={'resize'}}, {@discard_size={'discard', 0x3d, 0x200}}, {@iocharset={'iocharset', 0x3d, 'macroman'}}, {@resize_size={'resize', 0x3d, 0x400}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@euid_eq={'euid'}}], 0x600000000000000}) [ 2390.914912][T10699] JFS: Cannot determine volume size 04:22:16 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000000)={0x6}) ioctl$DRM_IOCTL_RES_CTX(r0, 0xc0106426, &(0x7f00000000c0)={0x2, &(0x7f0000000080)=[{0x0}, {}]}) ioctl$DRM_IOCTL_GET_CTX(r0, 0xc0086423, &(0x7f0000000100)={r1, 0x1}) r2 = syz_open_dev$usb(&(0x7f0000000140)='/dev/bus/usb/00#/00#\x00', 0x1, 0x200000) getsockopt$llc_int(r2, 0x10c, 0xf, &(0x7f0000000180), &(0x7f00000001c0)=0x4) ioctl$SCSI_IOCTL_TEST_UNIT_READY(r2, 0x2) [ 2390.948903][T10699] JFS: Cannot determine volume size [ 2390.954269][T10699] jfs: Unrecognized mount option "fscontext=system_u" or missing value [ 2390.965426][T10701] overlayfs: './file0' not a directory 04:22:16 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x300000000000000, 0x0, 0x0, 0x0) 04:22:16 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x88a8ffff}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:16 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80000400200007fe, &(0x7f0000000040)={0x2, 0x0, @local}, 0x184) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000100)='/proc/capi/capi20\x00', 0x400a00, 0x0) ioctl$PPPOEIOCDFWD(r1, 0xb101, 0x0) bind$inet(r0, &(0x7f0000000000), 0x16a) r2 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000080)='cgroup.events\x00', 0x0, 0x0) ioctl$BLKBSZGET(r2, 0x80081270, &(0x7f00000000c0)) 04:22:16 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0xf0ffffffffffff, 0x0, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:16 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x400000000000000, 0x0, 0x0, 0x0) [ 2391.040429][T10699] JFS: Cannot determine volume size [ 2391.045754][T10699] JFS: Cannot determine volume size [ 2391.058349][T10699] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:22:16 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x88caffff}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:16 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80000400200007fe, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) bind$inet(r0, &(0x7f0000000000), 0x10) recvmsg$kcm(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000000c0)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast1}}}, 0x80, &(0x7f0000000040)=[{&(0x7f0000000140)=""/70, 0x46}, {&(0x7f00000001c0)=""/112, 0x70}, {&(0x7f0000000240)=""/175, 0xaf}], 0x3, &(0x7f0000000300)=""/211, 0xd3}, 0x2) ioctl$sock_rose_SIOCRSCLRRT(r1, 0x89e4) 04:22:16 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x100000000000000, 0x0, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:16 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000001700)={[{@resize='resize'}, {@resize='resize'}, {@resize_size={'resize'}}, {@discard_size={'discard', 0x3d, 0x200}}, {@iocharset={'iocharset', 0x3d, 'macroman'}}, {@resize_size={'resize', 0x3d, 0x400}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@euid_eq={'euid'}}], 0x700000000000000}) 04:22:16 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x89060000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:16 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x500000000000000, 0x0, 0x0, 0x0) 04:22:16 executing program 3: syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x1, 0x2) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000000)={0x6, 0x200000}) 04:22:16 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x200000000000000, 0x0, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2391.257611][T10725] JFS: Cannot determine volume size [ 2391.289339][T10725] JFS: Cannot determine volume size 04:22:16 executing program 1: r0 = socket$inet(0x2, 0x5, 0xffff) sendto$inet(r0, 0x0, 0x0, 0x80000400200007fe, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) ioctl$sock_inet_tcp_SIOCOUTQNSD(r0, 0x894b, &(0x7f0000000040)) bind$inet(r0, &(0x7f0000000000), 0x10) 04:22:16 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha256-generic\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000002480), 0x120, 0x0, &(0x7f00000001c0)={0x77359400}) r3 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x7, 0x0) ioctl$VIDIOC_ENUM_DV_TIMINGS(r3, 0xc0945662, &(0x7f00000000c0)={0x2, 0x0, [], {0x0, @bt={0x7, 0x80000000, 0x1, 0x1, 0xab65, 0x2, 0x3, 0x8000, 0x3, 0x200, 0x6, 0x7, 0x80000000, 0x3f}}}) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000000)={0x6}) ioctl$DRM_IOCTL_AGP_FREE(r0, 0x40206435, &(0x7f0000000180)={0x1ff, 0x0, 0x0, 0x3}) 04:22:16 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0xfeffffff}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) [ 2391.319117][T10725] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:22:16 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x600000000000000, 0x0, 0x0, 0x0) 04:22:16 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x300000000000000, 0x0, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2391.416141][T10725] JFS: Cannot determine volume size 04:22:17 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x700000000000000, 0x0, 0x0, 0x0) [ 2391.464017][T10725] JFS: Cannot determine volume size 04:22:17 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0xffffa888}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) [ 2391.508761][T10725] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:22:17 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000001700)={[{@resize='resize'}, {@resize='resize'}, {@resize_size={'resize'}}, {@discard_size={'discard', 0x3d, 0x200}}, {@iocharset={'iocharset', 0x3d, 'macroman'}}, {@resize_size={'resize', 0x3d, 0x400}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@euid_eq={'euid'}}], 0x900000000000000}) 04:22:17 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x600000000000000, 0x0, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:17 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80000400200007fe, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) r1 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x2, 0x2) ioctl$LOOP_GET_STATUS64(r1, 0x4c05, &(0x7f00000000c0)) bind$inet(r0, &(0x7f0000000000), 0x10) 04:22:17 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0xffffca88}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:17 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x800000000000000, 0x0, 0x0, 0x0) 04:22:17 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x700000000000000, 0x0, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:17 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) socket$isdn(0x22, 0x3, 0x3) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000000)={0x6}) 04:22:17 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0xffffdd86}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:17 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x900000000000000, 0x0, 0x0, 0x0) 04:22:17 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000100)='/dev/btrfs-control\x00', 0x42000, 0x0) ioctl$KVM_SET_XSAVE(r1, 0x5000aea5, &(0x7f0000000480)={"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"}) sendto$inet(r0, 0x0, 0x0, 0x80000400200007fe, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) r2 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f00000002c0)='/proc/capi/capi20ncci\x00', 0x181000, 0x0) setsockopt$inet6_tcp_TCP_ULP(r2, 0x6, 0x1f, &(0x7f00000000c0)='tls\x00', 0x170) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000340)=ANY=[@ANYBLOB="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"]) r3 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x3, 0x202) ioctl$KVM_ASSIGN_SET_INTX_MASK(r3, 0x4040aea4, &(0x7f00000001c0)={0x8, 0x0, 0x40, 0x3, 0x7ff}) getsockopt$inet_sctp6_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000200)={0x0, 0x100000001, 0x8}, &(0x7f0000000240)=0x8) setsockopt$inet_sctp6_SCTP_RESET_STREAMS(r3, 0x84, 0x77, &(0x7f0000000280)={r4, 0x0, 0x7, [0x8, 0x4, 0x80, 0xd81, 0x2, 0x2, 0x1]}, 0x16) bind$inet(r0, &(0x7f0000000000), 0x10) [ 2391.715916][T10765] JFS: Cannot determine volume size [ 2391.723784][T10765] JFS: Cannot determine volume size [ 2391.746482][T10765] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:22:17 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0xfffff000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:17 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x800000000000000, 0x0, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2391.826884][T10765] JFS: Cannot determine volume size [ 2391.844028][T10765] JFS: Cannot determine volume size [ 2391.865401][T10765] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:22:17 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000001700)={[{@resize='resize'}, {@resize='resize'}, {@resize_size={'resize'}}, {@discard_size={'discard', 0x3d, 0x200}}, {@iocharset={'iocharset', 0x3d, 'macroman'}}, {@resize_size={'resize', 0x3d, 0x400}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@euid_eq={'euid'}}], 0xa00000000000000}) 04:22:17 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000000)={0x6}) r1 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm-control\x00', 0x0, 0x0) getsockopt$bt_rfcomm_RFCOMM_CONNINFO(r1, 0x12, 0x2, &(0x7f00000000c0)=""/133, &(0x7f0000000180)=0x85) 04:22:17 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0xffffffffffffff31, 0x80000400200007fe, &(0x7f00000013c0)={0x2, 0x0, @remote}, 0x10) bind$inet(r0, &(0x7f0000000000), 0x10) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x2000, 0x0) getsockopt$inet_sctp6_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000001c0)={0x0, 0x81, "447567f5bd52ac27c9ddd8ed8be994d11484f12a8da5c60d54d4a5c5b10cbb24de116ac85f96ae6670c4ebef90e2fd9fc61748a87180feabe797b7d9c682b054dfab08bd4e32909c484a81e062ed9c843b36f834a003fae23f2d4656f8600c80ccb3bb96deef2eae6e34a21b8ac95de3d32b556f55bf12c2fcf9d3a0c684ce815f"}, &(0x7f0000000280)=0x89) setsockopt$inet_sctp6_SCTP_RECONFIG_SUPPORTED(r1, 0x84, 0x75, &(0x7f00000002c0)={r2, 0xfffffffffffffffc}, 0x8) r3 = dup2(r0, r1) write$UHID_INPUT2(r3, &(0x7f00000000c0)={0xc, 0xd5, "850e7e4ba67fc1f07288c02221a3c7c8bc6e36b1ae81a0089cdc583f23b2a0140fdd6a44529ebd56dc11b17747b54ac0e909e992b8fa9b19093c6c86946412b981c63e152ef32778e911e6aaf518bf2205233fa15d3632bcbf021ba17f1b01ab47b13440c83c44d12c25e91ffb15e7600953ca2c1318e0e045553d26fa4b166aa4b25d468826dd1a969863bd84f622d23726745c3e6d9804549dd8a20766fbb9c934b83175fca6d349bf2717276258b6144b89cb572526679d32a693d6a6b3f6e2d8a5f77ef54fdf2e3ecf90d85d8b36378f320d7a"}, 0xdb) getsockopt$inet_sctp6_SCTP_GET_LOCAL_ADDRS(r3, 0x84, 0x6d, &(0x7f0000000300)={r2, 0x1000, "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"}, &(0x7f0000001340)=0x1008) 04:22:17 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xa00000000000000, 0x0, 0x0, 0x0) 04:22:17 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0xfffffffe}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:17 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x806000000000000, 0x0, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:17 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x190f000000000000, 0x0, 0x0, 0x0) 04:22:17 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80000400200007fe, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) bind$inet(r0, &(0x7f0000000000), 0x10) setsockopt$EBT_SO_SET_ENTRIES(r0, 0x0, 0x80, &(0x7f00000009c0)=@nat={'nat\x00', 0x19, 0x6, 0x900, [0x200000c0, 0x0, 0x0, 0x200000f0, 0x200003d8], 0x0, &(0x7f0000000040), &(0x7f00000000c0)=[{}, {0x0, '\x00', 0x0, 0xffffffffffffffff, 0x2, [{{{0x1b, 0x1, 0x98ff, 'bcsh0\x00', 'gre0\x00', 'veth0_to_bridge\x00', 'caif0\x00', @remote, [0xff, 0xff, 0xff, 0xff, 0xff, 0xff], @local, [0xff, 0x0, 0x0, 0x0, 0xff], 0x70, 0xe0, 0x118}, [@arpreply={'arpreply\x00', 0x10, {{@broadcast, 0xfffffffffffffffe}}}, @snat={'snat\x00', 0x10, {{@remote, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0x10, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, 0xfffffffffffffffe}}}}, {{{0x9, 0x0, 0x6001, 'syzkaller0\x00', 'bcsf0\x00', 'veth1_to_team\x00', 'veth0\x00', @empty, [0xff, 0x0, 0x0, 0xff, 0x0, 0xff], @local, [0xff, 0xff, 0xff, 0x0, 0xff], 0xe8, 0x168, 0x1a0, [@limit={'limit\x00', 0x20, {{0x7, 0x0, 0x200, 0x401, 0x100000001, 0x101}}}, @cgroup0={'cgroup\x00', 0x8, {{0x100000000}}}]}, [@common=@ERROR={'ERROR\x00', 0x20, {"eb23f988e6625940d53af42825123fe8fed84a74df726e16c3c095005048"}}, @arpreply={'arpreply\x00', 0x10}]}, @snat={'snat\x00', 0x10, {{@remote, 0xffffffffffffffff}}}}]}, {0x0, '\x00', 0x2, 0xfffffffffffffffc, 0x2, [{{{0x0, 0x20, 0xf7, 'veth1_to_hsr\x00', 'ip6gretap0\x00', 'ip6gretap0\x00', 'vcan0\x00', @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xe}, [0xff, 0xff, 0xff, 0xff, 0xff], @empty, [0x0, 0x0, 0xff, 0xff, 0xff, 0xff], 0x1c8, 0x1c8, 0x200, [@connlabel={'connlabel\x00', 0x8, {{0x40, 0x2}}}, @comment={'comment\x00', 0x100}]}}, @snat={'snat\x00', 0x10, {{@empty, 0xffffffffffffffff}}}}, {{{0x7, 0x1, 0x6003, 'batadv0\x00', 'nr0\x00', 'syzkaller1\x00', 'sit0\x00', @random="47691bdfe8bb", [0xff, 0x0, 0x0, 0xff], @random="7a512bd4ca4f", [0x0, 0xff, 0x0, 0x0, 0xff, 0xff], 0xc0, 0xf8, 0x130, [@nfacct={'nfacct\x00', 0x28, {{'syz1\x00', 0xcbe}}}]}, [@snat={'snat\x00', 0x10, {{@broadcast, 0xfffffffffffffffe}}}]}, @arpreply={'arpreply\x00', 0x10, {{@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}, 0xfffffffffffffffd}}}}]}, {0x0, '\x00', 0x4, 0xfffffffffffffffe, 0x2, [{{{0x3, 0x1, 0x8b1d, 'ip6erspan0\x00', 'nr0\x00', 'tunl0\x00', 'ip6gre0\x00', @local, [0x0, 0xff, 0xff, 0xff, 0xff, 0xff], @broadcast, [0xff, 0x0, 0xff, 0x0, 0x0, 0xff], 0xa0, 0x110, 0x148, [@connlabel={'connlabel\x00', 0x8, {{0x8787, 0x3}}}]}, [@arpreply={'arpreply\x00', 0x10, {{@broadcast, 0xfffffffffffffffd}}}, @arpreply={'arpreply\x00', 0x10, {{@remote, 0xfffffffffffffffc}}}]}, @arpreply={'arpreply\x00', 0x10}}, {{{0x3, 0x28, 0x89ff, 'caif0\x00', 'bpq0\x00', 'hwsim0\x00', 'caif0\x00', @dev={[], 0x1d}, [0x0, 0x0, 0xff, 0xff, 0xff, 0xff], @random="df6d29a93ec0", [0x0, 0xff, 0xff, 0x0, 0xff, 0xff], 0x70, 0xe0, 0x110}, [@arpreply={'arpreply\x00', 0x10, {{@empty, 0xffffffffffffffff}}}, @arpreply={'arpreply\x00', 0x10, {{@local, 0xfffffffffffffffd}}}]}, @common=@STANDARD={'\x00', 0x8, {0xffffffffffffffff}}}]}]}, 0x978) 04:22:17 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0xf0ffffffffffff}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:17 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0xd00000000000000, 0x0, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:17 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x0, 0x800) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000000)={0x6}) 04:22:17 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1f00000000000000, 0x0, 0x0, 0x0) [ 2392.110203][T10797] JFS: Cannot determine volume size [ 2392.115440][T10797] JFS: Cannot determine volume size [ 2392.158526][T10804] kernel msg: ebtables bug: please report to author: EBT_ENTRY_OR_ENTRIES shouldn't be set in distinguisher [ 2392.170206][T10797] jfs: Unrecognized mount option "fscontext=system_u" or missing value [ 2392.214713][T10797] JFS: Cannot determine volume size [ 2392.223375][T10797] JFS: Cannot determine volume size [ 2392.246826][T10797] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:22:17 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000001700)={[{@resize='resize'}, {@resize='resize'}, {@resize_size={'resize'}}, {@discard_size={'discard', 0x3d, 0x200}}, {@iocharset={'iocharset', 0x3d, 'macroman'}}, {@resize_size={'resize', 0x3d, 0x400}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@euid_eq={'euid'}}], 0x1000000000000000}) 04:22:17 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000000)={0x6}) ioctl$DRM_IOCTL_MODE_GETRESOURCES(r0, 0xc04064a0, &(0x7f0000000180)={&(0x7f0000000080)=[0x0, 0x0, 0x0, 0x0], &(0x7f00000000c0)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0], &(0x7f0000000100)=[0x0], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0], 0x4, 0x8, 0x1, 0x6}) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f00000001c0)='/proc/capi/capi20\x00', 0x40200, 0x0) ioctl$RTC_WKALM_SET(r1, 0x4028700f, &(0x7f0000000200)={0x0, 0x0, {0x1a, 0x31, 0x12, 0xd, 0x3, 0x8, 0x6, 0x4d, 0x1}}) 04:22:17 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) fallocate(r0, 0x5, 0x3, 0x1ff) sendto$inet(r0, 0x0, 0x0, 0x80000400200007fe, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) bind$inet(r0, &(0x7f0000000000), 0x10) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000004fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$void(r1, 0xc0045878) r2 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000280)='/dev/input/mouse#\x00', 0x0, 0x8000) setsockopt$bt_BT_RCVMTU(r3, 0x112, 0xd, &(0x7f00000002c0), 0x2) r4 = getpgid(0xffffffffffffffff) ioprio_set$pid(0x3, r4, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000140)) r5 = memfd_create(&(0x7f0000000080)='dev ', 0x5) ioctl$FS_IOC_RESVSP(r5, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0xa}) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r6, 0xc028564d, &(0x7f0000000140)={0x1, 0x1, [0x0, 0x5, 0x0, 0x0, 0xb2]}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r8 = memfd_create(0x0, 0x0) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_CREATE_BUFS(r8, 0xc100565c, &(0x7f0000000340)={0x3, 0xb7f8, 0x0, {0x0, @sliced={0xbd, [0x0, 0x10001, 0x8, 0x400000000, 0x1000, 0x9, 0x80, 0x0, 0x64fb, 0x0, 0xffff, 0x4f, 0x7f, 0x80000000, 0x9, 0x10000, 0x1, 0x300000, 0x8, 0x0, 0x4, 0x0, 0x0, 0x7, 0x9, 0x4, 0xfffffffffffffffc, 0x7ff, 0x0, 0xffffffff, 0x7, 0x1000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x81, 0xd34, 0x0, 0x2, 0x80000001, 0x9e, 0x1, 0x7, 0x9, 0xc18, 0x2], 0x1}}}) close(r7) r9 = add_key(&(0x7f0000000040)='asymmetric\x00', 0x0, &(0x7f00000001c0)="153520ae1e3b8f747ac285572a549ffe3c9f09fc8a2cc8abbab655c8953df46ff4eef00fced831ca9af9c813fd8c5e1674d6dc1d7cbdf94ca72af65e94c804c3109115070b9ca4767aeae60fe2fe3fb715dfdec6fa9afc7e3170876cbdcff42ea24eadcd8ff1e7bc3538a913dff6af14a6c65aa12a1346c9b6b7b129290552ed982d3c83a847a8fcaaf4556c19dd5847ee2f8b58a14dad8a9e50cfd4e5e4e5edb64cfc4915bdaa8bdae6f2f94d9e", 0xae, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r9, &(0x7f0000000500)='encrypted\x00', &(0x7f0000000540)='wlan1em0\\(mime_typewlan0ppp1ppp1proc[)}cpusetvboxnet1securityppp1self\x00') ftruncate(r2, 0x8200) mmap(&(0x7f0000006000/0x1000)=nil, 0x1000, 0x10800022, 0x11, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 04:22:17 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x1000000000000000, 0x0, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:17 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x2000000000000000, 0x0, 0x0, 0x0) 04:22:17 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x100000000000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:17 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x1400000000000000, 0x0, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:17 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x2010000000000000, 0x0, 0x0, 0x0) 04:22:17 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x200000000000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:17 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuset.effective_cpus\x00', 0x0, 0x0) getpeername$netlink(r1, &(0x7f0000000180), &(0x7f00000001c0)=0xc) r2 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x800, 0x0) openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000500)='/dev/dlm-monitor\x00', 0x400200, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_INFO(r2, 0x810c5701, &(0x7f0000000380)) write$RDMA_USER_CM_CMD_CREATE_ID(r2, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x0, &(0x7f00000000c0)={0xffffffffffffffff}, 0x0, 0xb}}, 0x20) write$RDMA_USER_CM_CMD_RESOLVE_ADDR(r2, &(0x7f0000000240)={0x15, 0x110, 0xfa00, {r3, 0x80000000, 0x0, 0x0, 0x0, @in={0x2, 0x4e22, @broadcast}, @in={0x2, 0x4e23, @multicast1}}}, 0x118) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000000)={0x6}) [ 2392.424292][T10826] JFS: Cannot determine volume size [ 2392.453622][T10826] JFS: Cannot determine volume size 04:22:18 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x300000000000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:18 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x2000000000000000, 0x0, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2392.489056][T10826] jfs: Unrecognized mount option "fscontext=system_u" or missing value [ 2392.591527][T10826] JFS: Cannot determine volume size [ 2392.596765][T10826] JFS: Cannot determine volume size [ 2392.608225][T10826] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:22:18 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x2300000000000000, 0x0, 0x0, 0x0) 04:22:18 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80000400200007fe, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) bind$inet(r0, &(0x7f0000000000), 0x10) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x3, &(0x7f0000000040)='!!\x00'}, 0x30) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000100)=r1) 04:22:18 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000080)='/dev/dsp#\x00', 0x15, 0x0) signalfd(r1, &(0x7f00000001c0)={0x4}, 0x8) ioctl$GIO_UNIMAP(r1, 0x4b66, &(0x7f0000000140)={0x3, &(0x7f0000000100)=[{}, {}, {}]}) ioctl$VIDIOC_G_SELECTION(r1, 0xc040565e, &(0x7f0000000180)={0xc, 0x2, 0x4, {0x3, 0x421, 0x1, 0x2}}) ioctl$IOC_PR_CLEAR(r1, 0x401070cd, &(0x7f00000000c0)={0x1f}) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000000)={0x6}) 04:22:18 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x400000000000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:18 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000001700)={[{@resize='resize'}, {@resize='resize'}, {@resize_size={'resize'}}, {@discard_size={'discard', 0x3d, 0x200}}, {@iocharset={'iocharset', 0x3d, 'macroman'}}, {@resize_size={'resize', 0x3d, 0x400}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@euid_eq={'euid'}}], 0x190f000000000000}) 04:22:18 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x2800000000000000, 0x0, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:18 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3f00000000000000, 0x0, 0x0, 0x0) [ 2392.758016][T10859] JFS: Cannot determine volume size 04:22:18 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x600000000000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:18 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80000400200007fe, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='map_files\x00') ioctl$VT_SETMODE(r1, 0x5602, &(0x7f00000000c0)={0xffffffffffffffff, 0x5, 0x7ff, 0xfffffffffffffffb, 0x800}) bind$inet(r0, &(0x7f0000000000), 0x10) 04:22:18 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x3f00000000000000, 0x0, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:18 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x2, 0xfffffffffffffffd) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000000)={0x6}) ioctl$DRM_IOCTL_VERSION(r0, 0xc0406400, &(0x7f0000000280)={0x0, 0x3, 0x800, 0x9a, &(0x7f00000000c0)=""/154, 0x7e, &(0x7f0000000180)=""/126, 0x46, &(0x7f0000000200)=""/70}) r1 = dup2(r0, r0) openat(r1, &(0x7f0000000080)='./file0\x00', 0x20000, 0xa0) [ 2392.779481][T10859] JFS: Cannot determine volume size [ 2392.794813][T10859] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:22:18 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x4000000000000000, 0x0, 0x0, 0x0) 04:22:18 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x700000000000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) [ 2392.877591][T10859] JFS: Cannot determine volume size [ 2392.892642][T10859] JFS: Cannot determine volume size [ 2392.914040][T10859] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:22:18 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0xfffffffffffffffc, 0x80) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000000)={0x8}) 04:22:18 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x4800000000000000, 0x0, 0x0, 0x0) 04:22:18 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x800000000000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:18 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000001700)={[{@resize='resize'}, {@resize='resize'}, {@resize_size={'resize'}}, {@discard_size={'discard', 0x3d, 0x200}}, {@iocharset={'iocharset', 0x3d, 'macroman'}}, {@resize_size={'resize', 0x3d, 0x400}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@euid_eq={'euid'}}], 0x1f00000000000000}) 04:22:18 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x4000000000000000, 0x0, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:18 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80000400200007fe, &(0x7f0000000080)={0x2, 0x4e24, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) bind$inet(r0, &(0x7f0000000000), 0x10) 04:22:18 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000180)='/dev/dri/card#\x00', 0x404, 0x400000) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000000)={0x2, 0x9}) 04:22:18 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x806000000000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:18 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x4c00000000000000, 0x0, 0x0, 0x0) 04:22:18 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80000400200007fe, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) bind$inet(r0, &(0x7f0000000000), 0x10) ioctl$sock_inet_SIOCDARP(r0, 0x8953, &(0x7f00000000c0)={{0x2, 0x4e22, @empty}, {0x1, @dev={[], 0x15}}, 0x58, {0x2, 0x4e23, @empty}, 'bond0\x00'}) 04:22:18 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x4305000000000000, 0x0, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:18 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0xd00000000000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:18 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6800000000000000, 0x0, 0x0, 0x0) [ 2393.143406][T10896] JFS: Cannot determine volume size [ 2393.148647][T10896] JFS: Cannot determine volume size 04:22:18 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040)='/dev/net/tun\x00', 0x2000, 0x0) r1 = geteuid() ioctl$TUNSETOWNER(r0, 0x400454cc, r1) r2 = openat$mixer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/mixer\x00', 0xf3f6c37a6ad4ae7c, 0x0) getsockopt$inet_pktinfo(r2, 0x0, 0x8, &(0x7f00000000c0)={0x0, @local, @loopback}, &(0x7f0000000100)=0xc) connect$packet(r2, &(0x7f0000000140)={0x11, 0x17, r3, 0x1, 0x7, 0x6, @remote}, 0x14) ioctl$DRM_IOCTL_GET_CAP(0xffffffffffffffff, 0xc010640c, &(0x7f0000000000)={0x6}) 04:22:18 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x800e000000000000, 0x0, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2393.212994][T10896] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:22:18 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000001700)={[{@resize='resize'}, {@resize='resize'}, {@resize_size={'resize'}}, {@discard_size={'discard', 0x3d, 0x200}}, {@iocharset={'iocharset', 0x3d, 'macroman'}}, {@resize_size={'resize', 0x3d, 0x400}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@euid_eq={'euid'}}], 0x2000000000000000}) 04:22:18 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80000400200007fe, &(0x7f0000000080)={0x2, 0x0, @empty}, 0x10) bind$inet(r0, &(0x7f0000000000), 0x10) 04:22:18 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x1000000000000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:18 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x6c00000000000000, 0x0, 0x0, 0x0) 04:22:18 executing program 3: syz_open_dev$dri(&(0x7f0000000280)='/dev/dri/card#\x00', 0x6, 0x0) openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/attr/current\x00', 0x2, 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f0000000000)='/dev/snd/pcmC#D#p\x00', 0x1, 0x0) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffff9c, 0x84, 0xf, &(0x7f0000000100)={0x0, @in={{0x2, 0x4e24, @multicast1}}, 0x9, 0x1, 0x9, 0x8000000001, 0x8}, &(0x7f0000000040)=0x98) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000001c0)={r1, 0x80, "458b1fdf1c9b76f6a1103d4f7ea571c3139666c004e6aeb5f759c26d4a8d346f228a757960c002da292875a68ecaf8849234ab14e7ca48de3a23ce6cc2f37722d73bd6684ee9fe45d1b7276ecc3a46e17f520537b25022518c634d240e2e2fee4019d6a2271ae24cc09bbedc478d3afe12cb26d4d82330f9314201c81b6644b0"}, &(0x7f0000000080)=0x88) 04:22:18 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x8035000000000000, 0x0, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2393.328732][T10896] JFS: Cannot determine volume size [ 2393.334172][T10896] JFS: Cannot determine volume size [ 2393.345828][T10896] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:22:19 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dlm_plock\x00', 0x2000, 0x0) open_by_handle_at(r0, &(0x7f0000000180)=ANY=[@ANYBLOB="5300b538000004000000b9e5daa9660669d4b584f45f6c2b3aa60322d5aceebd36a29d2d077ad37acb9b8bdfd97c6b1ccea05f33171d4bb569e66cc3526571e5a880d5b96ba3572858fb0a3d86532dfd3bc5d3"], 0x800) syz_open_dev$sg(&(0x7f0000000140)='/dev/sg#\x00', 0x400, 0x40) ioctl$EVIOCGABS3F(r1, 0x8018457f, &(0x7f0000000100)=""/3) write$FUSE_IOCTL(r1, &(0x7f00000000c0)={0x20, 0x0, 0x8, {0x7f, 0x4, 0x0, 0x8}}, 0x20) ioctl$DRM_IOCTL_GET_CAP(r1, 0xc010640c, &(0x7f0000000240)={0x7}) close(r1) 04:22:19 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7400000000000000, 0x0, 0x0, 0x0) 04:22:19 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80000400200007fe, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) r1 = syz_open_dev$midi(&(0x7f0000000040)='/dev/midi#\x00', 0x8000, 0x8000) syz_open_pts(r1, 0x400100) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) bind$inet(r0, &(0x7f0000000000), 0x0) 04:22:19 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x1100000000000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:19 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x8100000000000000, 0x0, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2393.468377][T10926] JFS: Cannot determine volume size [ 2393.478196][T10926] JFS: Cannot determine volume size [ 2393.489404][T10926] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:22:19 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x86ddffff00000000, 0x0, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2393.545944][T10926] JFS: Cannot determine volume size [ 2393.557042][T10926] JFS: Cannot determine volume size [ 2393.569312][T10926] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:22:19 executing program 1: r0 = open(&(0x7f0000000040)='./file0\x00', 0x40, 0x2) sendto$packet(r0, &(0x7f00000000c0)="6fbdb485bf3069f6e2dfba1fefc8c4b37fe9dd4d43eb23c75d87c9a77467cf3a3726ba519a61659fc7f8313c09a6fc86220fb425e6f93f6e2452708b444f34f7ba9ba3fb1d4f72b2a2bdef81b1db80a0c4ba44978f4261f3d88a5ebe40600b962a7cef2e800f414793d6dee22adfca55997cb097d6902506c2de874e078d4f8f7046bffee75d967543437b03a431946dd7b99aad66673aabdcccddf4b3d1385a9f19cf1a7c833a175031f193f0eeb7fea9e5d9fc83b22f72d9583e0ad8da57b73a374728b0db9328c5cd55db8134da558069bc1fc67382040f0e7dbe535c7cbf04431cc4c02ef2d15609535fff3af78805076392f1", 0xf5, 0x0, 0x0, 0x0) r1 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r1, 0x0, 0x0, 0x80000400200007fe, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) bind$inet(r1, &(0x7f0000000000), 0x10) 04:22:19 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000001700)={[{@resize='resize'}, {@resize='resize'}, {@resize_size={'resize'}}, {@discard_size={'discard', 0x3d, 0x200}}, {@iocharset={'iocharset', 0x3d, 'macroman'}}, {@resize_size={'resize', 0x3d, 0x400}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@euid_eq={'euid'}}], 0x2010000000000000}) 04:22:19 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) r1 = openat$full(0xffffffffffffff9c, &(0x7f0000000080)='/dev/full\x00', 0x4000c0, 0x0) ioctl$KDGKBENT(r1, 0x4b46, &(0x7f00000000c0)={0x20, 0x3, 0x9}) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000000)={0x6}) 04:22:19 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7a00000000000000, 0x0, 0x0, 0x0) 04:22:19 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x1400000000000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:19 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x1c00000000000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:19 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x8847000000000000, 0x0, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2393.729672][T10948] JFS: Cannot determine volume size 04:22:19 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x100, 0x0) getsockopt$inet_sctp6_SCTP_PEER_ADDR_PARAMS(0xffffffffffffff9c, 0x84, 0x9, &(0x7f0000000080)={0x0, @in6={{0xa, 0x4e20, 0x81, @local, 0x1}}, 0xfa, 0x2, 0x7, 0x401, 0x2}, &(0x7f0000000140)=0xfffffdac) setsockopt$inet_sctp6_SCTP_RTOINFO(r0, 0x84, 0x0, &(0x7f0000000180)={r1, 0x100000001, 0xcaf, 0xfff}, 0x10) syz_open_dev$dri(&(0x7f0000000000)='/dev/dri/card#\x00', 0x23f, 0x0) [ 2393.758980][T10948] JFS: Cannot determine volume size [ 2393.770026][T10948] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:22:19 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80000400200007fe, &(0x7f0000000040)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x11}}, 0xffffffbd) r1 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x40, 0x600000) ioctl$VIDIOC_G_EDID(r1, 0xc0285628, &(0x7f0000000100)={0x0, 0x3, 0x9, [], &(0x7f00000000c0)=0x804}) bind$inet(r0, &(0x7f0000000000), 0x10) pread64(r1, &(0x7f0000000140)=""/117, 0x75, 0x0) 04:22:19 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x7fffffffffffffff, 0x0, 0x0, 0x0) 04:22:19 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x8848000000000000, 0x0, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:19 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x2000000000000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:19 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000140)={0x6, 0xa9}) r1 = openat$capi20(0xffffffffffffff9c, &(0x7f0000000080)='/dev/capi20\x00', 0x80000, 0x0) write$capi20(r1, &(0x7f00000000c0)={0x10, 0x2, 0x86, 0x83, 0x800, 0x400}, 0x10) [ 2393.890935][T10948] JFS: Cannot determine volume size [ 2393.896256][T10948] JFS: Cannot determine volume size [ 2393.922741][T10948] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:22:19 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000001700)={[{@resize='resize'}, {@resize='resize'}, {@resize_size={'resize'}}, {@discard_size={'discard', 0x3d, 0x200}}, {@iocharset={'iocharset', 0x3d, 'macroman'}}, {@resize_size={'resize', 0x3d, 0x400}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@euid_eq={'euid'}}], 0x3f00000000000000}) 04:22:19 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x8000000000000000, 0x0, 0x0, 0x0) 04:22:19 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f00000000c0)={0x0, {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e23, @initdev={0xac, 0x1e, 0x0, 0x0}}, {0x2, 0x4e23, @loopback}, 0x200, 0x0, 0x0, 0x0, 0x6, &(0x7f0000000040)='erspan0\x00', 0x3, 0x5, 0x401}) sendto$inet(r0, 0x0, 0x0, 0x80000400200007fe, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) bind$inet(r0, &(0x7f0000000000), 0x10) timer_create(0x0, &(0x7f0000000280)={0x0, 0x3e, 0x0, @thr={&(0x7f0000000140)="6892951a7101a34944fb0a191c9f7061329baf0e5838d0e027adaa337149d68f80e1ebb06d5ffb1b1eb9757b22056c217347d42263400847f7cbca6a167907a5f4dd3c28a20032246f9c38191e7ec11c6fcc982841deba433c43ac8554faae0ff800c87bfac10f19dad840a5ed044ff0e26c2d21eb69aa60041cebdf6d7255a8e8d4b124447a88d2", &(0x7f0000000200)="9b7612f2c46f0c21f070bf45d34075d92394eef5717b1f64cc8cd0324511b2e82b59b84c0141b30677861c55e10129ca13a85307ab8ef4ccaa2b9455617313887ce135c8e55bf885cf478cb69c7d"}}, &(0x7f00000002c0)=0x0) timer_delete(r1) 04:22:19 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x8864000000000000, 0x0, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:19 executing program 3: r0 = syz_open_dev$radio(&(0x7f0000000080)='/dev/radio#\x00', 0x0, 0x2) accept$packet(r0, 0x0, &(0x7f0000000140)) ioctl$sock_inet_SIOCSARP(r0, 0x8955, &(0x7f00000000c0)={{0x2, 0x4e20, @remote}, {0x306, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x3}}, 0x10, {0x2, 0x4e20, @remote}, 'ip6tnl0\x00'}) r1 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = socket$inet_udp(0x2, 0x2, 0x0) connect$inet(r3, &(0x7f0000000000)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_MCAST_JOIN_GROUP(r3, 0x0, 0x2a, &(0x7f0000000200)={0x8, {{0x2, 0x0, @multicast2}}}, 0x88) ioctl$DRM_IOCTL_GET_CAP(r1, 0xc010640c, &(0x7f0000000000)={0x6}) 04:22:19 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x3f00000000000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:19 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x8cffffff00000000, 0x0, 0x0, 0x0) 04:22:19 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x20000080, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) bind$inet(r0, &(0x7f0000000000), 0x10) 04:22:19 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) r1 = syz_open_dev$media(&(0x7f0000000080)='/dev/media#\x00', 0x1ec6, 0x2) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_NEW_DEST(r1, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x24, r2, 0x209, 0x70bd25, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x2}]}, 0x24}}, 0x4000) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000000)={0x6}) 04:22:19 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x4305000000000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:19 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x88a8ffff00000000, 0x0, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2394.171366][T10991] JFS: Cannot determine volume size [ 2394.184791][T10991] JFS: Cannot determine volume size [ 2394.208085][T10991] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:22:19 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x6000000000000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) [ 2394.379865][T10991] JFS: Cannot determine volume size [ 2394.385125][T10991] JFS: Cannot determine volume size [ 2394.390796][T10991] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:22:20 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000001700)={[{@resize='resize'}, {@resize='resize'}, {@resize_size={'resize'}}, {@discard_size={'discard', 0x3d, 0x200}}, {@iocharset={'iocharset', 0x3d, 'macroman'}}, {@resize_size={'resize', 0x3d, 0x400}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@euid_eq={'euid'}}], 0x4000000000000000}) 04:22:20 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xf4ffffff00000000, 0x0, 0x0, 0x0) 04:22:20 executing program 3: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/vcs\x00', 0x101000, 0x0) sendto$ax25(r0, &(0x7f0000000100)="371699605ebc3c", 0x7, 0x4, &(0x7f0000000140)={{0x3, @default, 0x4}, [@rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @default, @default, @default, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, @null]}, 0x48) syz_open_dev$dri(&(0x7f0000000080)='/dev/dri/card#\x00', 0x5, 0x420280) r1 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0xfffffffffffffffd, 0x0) ioctl$DRM_IOCTL_GET_CAP(r1, 0xc010640c, &(0x7f0000000000)={0x6}) 04:22:20 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x88caffff00000000, 0x0, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:20 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, &(0x7f00000000c0)={0x10000000000800, {{0x2, 0x4e20, @broadcast}}}, 0x88) sendto$inet(r0, 0x0, 0x0, 0x80000400200007fe, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) bind$inet(r0, &(0x7f0000000000), 0x10) 04:22:20 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x800e000000000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:20 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xf5ffffff00000000, 0x0, 0x0, 0x0) 04:22:20 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x8906000000000000, 0x0, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:20 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x8035000000000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) [ 2394.588095][T11021] JFS: Cannot determine volume size 04:22:20 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) rt_sigreturn() fsetxattr$security_smack_entry(r0, &(0x7f0000000140)='security.SMACK64IPIN\x00', &(0x7f0000000180)='\x00', 0x1, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x100) ioctl$sock_inet_SIOCGARP(r1, 0x8954, &(0x7f00000000c0)={{0x2, 0x4e23, @multicast2}, {0x306}, 0x40, {0x2, 0x4e21, @loopback}, 'veth1\x00'}) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000000)={0x6}) 04:22:20 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$inet_mreq(r0, 0x0, 0x24, &(0x7f00000012c0)={@remote, @local}, &(0x7f0000001300)=0x8) r1 = gettid() openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/fscreate\x00', 0x2, 0x0) mremap(&(0x7f0000189000/0x3000)=nil, 0x3000, 0x4000, 0x3, &(0x7f00005de000/0x4000)=nil) process_vm_writev(r1, &(0x7f0000000000)=[{&(0x7f00008f9f09)=""/247, 0xf7}], 0x1, &(0x7f0000121000)=[{&(0x7f0000217f28)=""/231, 0xffffff4e}], 0x23a, 0x0) mremap(&(0x7f00000ac000/0x400000)=nil, 0x400000, 0x1000, 0x0, &(0x7f00005cc000/0x1000)=nil) sendto$inet(r0, 0x0, 0x0, 0x80000400200007fe, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) bind$inet(r0, &(0x7f0000000000), 0x10) r2 = openat$autofs(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/autofs\x00', 0x200, 0x0) ioctl$TIOCGSID(r2, 0x5429, &(0x7f0000001500)=0x0) perf_event_open(&(0x7f0000001340)={0x0, 0x70, 0x2da, 0x8, 0x6, 0x7fffffff, 0x0, 0x1, 0x12018, 0x4, 0x7, 0x8, 0x100, 0xfffffffffffff001, 0x2, 0xffffffff, 0x1, 0xfffffffffffffff9, 0x7fffffff, 0x81, 0x80000001, 0x200, 0x7fffffff, 0x10000, 0x200, 0x80, 0x7, 0x1, 0x3, 0x3, 0x0, 0xffffffffffffff14, 0xf855, 0x4, 0x6, 0x9, 0x8001, 0xf96, 0x0, 0x3, 0x4, @perf_config_ext={0x31, 0x2ca9}, 0x28041, 0x7, 0x1, 0x3, 0xede, 0x80, 0x8}, r3, 0xd, 0xffffffffffffffff, 0x1) sendmsg$tipc(r2, &(0x7f00000013c0)={&(0x7f0000000100)=@id={0x1e, 0x3, 0x0, {0x4e21, 0x2}}, 0x10, &(0x7f0000001280)=[{&(0x7f0000000140)="54e276915729579b732607d070698e96d665087ada2f7ce2ea4d8132381987829cdfe74e23ac57ab6da270703db02ad853d572f433cd71909f71dab988d66c6ecb993cac99188674b4d65b7427e6b29b66a22d49f12dbb563b9c987cde83619df6cb014759dddb8ebc31713495472a56b37c966e3df64ae48a79d6be6d3f6a1575f6c3c5e9db6fe764b4bc7f2d484acc68c1082560256c8ca9be3298b7e43b4f3497581c43e184a8e99a49a036a173f5bbb7047e44d67ee730804789678cd739277adb64ce4d8d6a7c134f93e16f47082a888bba0606e60b905beda36cad2f270d9f5577", 0xe4}, {&(0x7f0000000240)="ef", 0x36a}, {&(0x7f0000000280)="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", 0x1000}], 0x3, &(0x7f0000001400)="ba356e657efdaa90f44e2e0f1014faeb84cf8721962a6d6bdbc1701ea530fab8aee824528ce2821d6e0a30584546dc779307ffaa0fcebf4f2d9084d36a7fd5e8b291d7b8da9e7e655b6049cedb77878b8438f89f8027e96f79dcb900d4bf652341c6c4aa390b8fa0782e4cd57c55fa93430b8b6c1502d6766dcf480d434de8f97dee278a33eabc357c63520a107cf870e3d81a430264bfef79e79e47e6999d69a5055324e38d6247f36d9199d97659e28e341f3b3222f80f9c6bc8a123d284154b427e6d482148dba40474709bf88d55", 0x13b, 0x8000}, 0x4000000) close(r0) bind$inet(r0, &(0x7f0000000040)={0x2, 0x4e24, @remote}, 0x10) 04:22:20 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xf6ffffff00000000, 0x0, 0x0, 0x0) [ 2394.638731][T11021] JFS: Cannot determine volume size [ 2394.654137][T11021] jfs: Unrecognized mount option "fscontext=system_u" or missing value [ 2394.705110][T11021] JFS: Cannot determine volume size [ 2394.728193][T11021] JFS: Cannot determine volume size [ 2394.742993][T11021] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:22:20 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000001700)={[{@resize='resize'}, {@resize='resize'}, {@resize_size={'resize'}}, {@discard_size={'discard', 0x3d, 0x200}}, {@iocharset={'iocharset', 0x3d, 'macroman'}}, {@resize_size={'resize', 0x3d, 0x400}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@euid_eq={'euid'}}], 0x4800000000000000}) 04:22:20 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0xfffffffffffff000, 0x0, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:20 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x8100000000000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:20 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x2, 0x0) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000000)={0x6}) ioctl$DRM_IOCTL_VERSION(r0, 0xc0406400, &(0x7f0000000280)={0x3, 0x8, 0x0, 0x80, &(0x7f0000000080)=""/128, 0xe7, &(0x7f0000000100)=""/231, 0x7d, &(0x7f0000000200)=""/125}) r1 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/ubi_ctrl\x00', 0x101001, 0x0) getpeername$packet(0xffffffffffffff9c, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000340)=0x14) connect$can_bcm(r1, &(0x7f0000000380)={0x1d, r2}, 0x10) 04:22:20 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xf9fdffff00000000, 0x0, 0x0, 0x0) 04:22:20 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x3a, 0x80, 0xfffffffffffffffd, 0xffffffffffffffe4) bind$inet(r0, &(0x7f0000000000), 0x10) signalfd4(r0, &(0x7f0000000040)={0x5}, 0x8, 0x0) 04:22:20 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x2, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:20 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x86ddffff00000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:20 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xfbffffff00000000, 0x0, 0x0, 0x0) 04:22:20 executing program 1: r0 = socket$inet(0x2, 0x4000000000000006, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000180)={{{@in=@initdev, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000000)=0xe8) setuid(r1) sendto$inet(r0, 0x0, 0x0, 0x80000400200007fe, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) ioctl$SNDRV_SEQ_IOCTL_GET_NAMED_QUEUE(r0, 0xc08c5336, &(0x7f00000000c0)={0x400, 0x7, 0x4, 'queue1\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xe3\xff\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00\x00\x15\x0f\x00', 0x7fffffff}) 04:22:20 executing program 3: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/dlm-monitor\x00', 0x10000, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffffff, 0xc0206434, &(0x7f0000000100)={0x7c8, 0x0, 0x0, 0x9}) ioctl$DRM_IOCTL_AGP_UNBIND(r0, 0x40106437, &(0x7f0000000140)={r1, 0x7}) r2 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_CAP(r2, 0xc010640c, &(0x7f0000000000)={0x6}) fcntl$F_SET_RW_HINT(r2, 0x40c, &(0x7f0000000080)=0x7) [ 2394.936071][T11050] JFS: Cannot determine volume size [ 2394.941959][T11050] JFS: Cannot determine volume size [ 2394.947304][T11050] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:22:20 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x3, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2395.010174][T11050] JFS: Cannot determine volume size [ 2395.015503][T11050] JFS: Cannot determine volume size [ 2395.023011][T11050] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:22:20 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000001700)={[{@resize='resize'}, {@resize='resize'}, {@resize_size={'resize'}}, {@discard_size={'discard', 0x3d, 0x200}}, {@iocharset={'iocharset', 0x3d, 'macroman'}}, {@resize_size={'resize', 0x3d, 0x400}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@euid_eq={'euid'}}], 0x4c00000000000000}) 04:22:20 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x8847000000000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:20 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80000400200007fe, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) bind$inet(r0, &(0x7f0000000000), 0x10) getsockopt$SO_BINDTODEVICE(r0, 0x1, 0x19, &(0x7f0000000040), 0x10) 04:22:20 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xfcfdffff00000000, 0x0, 0x0, 0x0) 04:22:20 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x6, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:20 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x8848000000000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:20 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff}) setsockopt$IP_VS_SO_SET_EDIT(r1, 0x0, 0x483, &(0x7f00000000c0)={0x3b, @multicast2, 0x4e23, 0x3, 'sh\x00', 0x4, 0xffffffff, 0x3c}, 0x2c) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000000)={0x6}) 04:22:20 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80000400200007fa, &(0x7f0000000080)={0x2, 0x0, @multicast1}, 0x10) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dsp\x00', 0x8000, 0x0) ioctl$DRM_IOCTL_AGP_ALLOC(0xffffffffffffff9c, 0xc0206434, &(0x7f0000000200)={0x4, 0x0, 0x10001, 0x607}) ioctl$DRM_IOCTL_SG_ALLOC(r1, 0xc0106438, &(0x7f0000000240)={0x6066, r2}) setsockopt$bt_BT_VOICE(r1, 0x112, 0xb, &(0x7f0000000540)=0x3, 0x2) bind$inet(r0, &(0x7f00000002c0)={0x2, 0xfffffffffffffffd, @broadcast}, 0x10) r3 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x40, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(r3, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@mcast1, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in=@remote}}, &(0x7f0000000000)=0xe8) stat(&(0x7f0000000280)='./file0\x00', &(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_CREATE_OPEN(r3, &(0x7f0000000480)={0xa0, 0xfffffffffffffff5, 0x2, {{0x6, 0x3, 0x5, 0x1, 0x9, 0x8, {0x5, 0xfff, 0xffffffffffffffc0, 0x6, 0x6, 0x7d, 0x6, 0x5, 0x2, 0x200, 0x0, r4, r5, 0x8000, 0x100}}, {0x0, 0x7}}}, 0xa0) ioctl$EVIOCGLED(r3, 0x80404519, &(0x7f00000000c0)=""/254) [ 2395.187650][T11075] JFS: Cannot determine volume size 04:22:20 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xfdfdffff00000000, 0x0, 0x0, 0x0) [ 2395.208979][T11075] JFS: Cannot determine volume size [ 2395.214237][T11075] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:22:20 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x7, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:20 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x8864000000000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:20 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80000400200007fe, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) fchdir(r0) bind$inet(r0, &(0x7f0000000000), 0x10) [ 2395.318179][T11075] JFS: Cannot determine volume size [ 2395.334654][T11075] JFS: Cannot determine volume size [ 2395.370089][T11075] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:22:20 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000001700)={[{@resize='resize'}, {@resize='resize'}, {@resize_size={'resize'}}, {@discard_size={'discard', 0x3d, 0x200}}, {@iocharset={'iocharset', 0x3d, 'macroman'}}, {@resize_size={'resize', 0x3d, 0x400}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@euid_eq={'euid'}}], 0x6000000000000000}) 04:22:20 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffffff, 0x89e2, &(0x7f0000000080)={0xffffffffffffffff}) setsockopt$inet_tcp_TCP_FASTOPEN_KEY(r1, 0x6, 0x21, &(0x7f00000000c0)="01691bfc34d09800987bd9169e742a70", 0x10) setsockopt$inet6_udp_encap(r1, 0x11, 0x64, &(0x7f0000000100)=0x4, 0x4) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000000)={0x6}) 04:22:20 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xfeffffff00000000, 0x0, 0x0, 0x0) 04:22:20 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x8, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:20 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x88a8ffff00000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:20 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) r1 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x208000) clock_gettime(0x0, &(0x7f0000000040)={0x0, 0x0}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r1, 0xc05c5340, &(0x7f0000000100)={0x4, 0x6, 0x76b9, {r2, r3+10000000}, 0xfffffffffffffff7, 0x7}) sendto$inet(r0, 0x0, 0x65, 0x80000400200007fe, &(0x7f0000000180)={0x2, 0x0, @local}, 0x10) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e24}, 0xfffffffffffffe9a) 04:22:21 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xff0f000000000000, 0x0, 0x0, 0x0) 04:22:21 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0xd, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:21 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000000)={0x6}) r1 = syz_open_dev$vcsa(&(0x7f0000000080)='/dev/vcsa#\x00', 0x2, 0x80) r2 = syz_genetlink_get_family_id$team(&(0x7f0000000100)='team\x00') getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000200)={{{@in=@multicast1, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@ipv4={[], [], @initdev}}}, &(0x7f0000000300)=0xe8) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@initdev, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast2}, 0x0, @in=@initdev}}, &(0x7f0000000440)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000000480)={0x11, 0x0, 0x0}, &(0x7f00000004c0)=0x14) getsockopt$inet6_mreq(0xffffffffffffff9c, 0x29, 0x1c, &(0x7f0000000500)={@empty, 0x0}, &(0x7f0000000540)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000680)={{{@in=@dev, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@initdev}}, &(0x7f0000000780)=0xe8) getpeername(0xffffffffffffffff, &(0x7f0000000c00)=@ll={0x11, 0x0, 0x0}, &(0x7f0000000c80)=0x80) getsockname$packet(0xffffffffffffffff, &(0x7f0000000cc0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000d00)=0x14) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000d40)={{{@in=@local, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@remote}}, &(0x7f0000000e40)=0xe8) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000000ec0)={'team0\x00', 0x0}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000f00)={{{@in=@multicast2, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @local}}, 0x0, @in6=@local}}, &(0x7f0000001000)=0xe8) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000001040)={'gretap0\x00', 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f0000001080)={{{@in6=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in=@broadcast}}, &(0x7f0000001180)=0xe8) accept(r0, &(0x7f0000001280)=@ll={0x11, 0x0, 0x0}, &(0x7f0000001300)=0x80) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000001340)={{{@in6, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in=@broadcast}}, &(0x7f0000001440)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000001480)={'vcan0\x00', 0x0}) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f00000014c0)={{{@in=@local, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@empty}}, &(0x7f00000015c0)=0xe8) getpeername$packet(0xffffffffffffffff, &(0x7f0000003c00)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000003c40)=0x14) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000003c80)={'vcan0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000003cc0)={'netdevsim0\x00', 0x0}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000003dc0)={'bridge_slave_1\x00', 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000003e00)={{{@in6=@empty, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in6=@remote}}, &(0x7f0000003f00)=0xe8) getsockopt$inet_mreqn(0xffffffffffffff9c, 0x0, 0x23, &(0x7f0000005f40)={@dev, @loopback, 0x0}, &(0x7f0000005f80)=0xc) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f0000006100)={'team0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffff9c, 0x8933, &(0x7f0000006140)={'vcan0\x00', 0x0}) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffff9c, 0x8933, &(0x7f00000062c0)={'team0\x00', 0x0}) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f00000063c0)={{{@in6, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@initdev}, 0x0, @in=@local}}, &(0x7f00000064c0)=0xe8) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000006500)={0x0, @empty, @local}, &(0x7f0000006540)=0xc) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000006580)={{{@in6=@dev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000006680)=0xe8) getpeername$packet(0xffffffffffffff9c, &(0x7f00000066c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000006700)=0x14) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000006740)={{{@in6=@remote, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@initdev}}, &(0x7f0000006840)=0xe8) sendmsg$TEAM_CMD_PORT_LIST_GET(r1, &(0x7f0000007600)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x85}, 0xc, &(0x7f00000075c0)={&(0x7f0000006880)={0xd24, r2, 0x620, 0x8, 0x25dfdbff, {}, [{{0x8, 0x1, r3}, {0x248, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r4}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x100000001}}}, {0x5c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x2c, 0x4, [{0x90, 0x0, 0x1, 0x200}, {0x1, 0xe1e9, 0x400}, {0x7, 0x35, 0x5, 0x200}, {0xfff, 0x200, 0x1170c00, 0x2}, {0x7, 0x7f, 0xbd, 0x7}]}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffffe}}, {0x8, 0x6, r5}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r6}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x2, 0x2, 0x401, 0x6314}]}}}]}}, {{0x8, 0x1, r7}, {0x130, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x6}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x8}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x7}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x6}}}]}}, {{0x8, 0x1, r8}, {0x204, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r9}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r10}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r11}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}, {0x5c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x2c, 0x4, [{0x7, 0xcdd, 0x1, 0x3}, {0x0, 0x8, 0x0, 0x7}, {0x9, 0x6530, 0x552, 0x7}, {0x5c8, 0x6}, {0x7, 0x9, 0x3, 0x81}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xfffffffffffffffd}}}]}}, {{0x8, 0x1, r12}, {0xf8, 0x2, [{0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r13}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r14}}}]}}, {{0x8, 0x1, r15}, {0x1e8, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r16}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0x3}}, {0x8, 0x6, r17}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r18}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8}}, {0x8, 0x6, r19}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x1ff}}, {0x8, 0x6, r20}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x6}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r21}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x5}}}]}}, {{0x8, 0x1, r22}, {0x78, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r23}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x1}}}]}}, {{0x8, 0x1, r24}, {0x7c, 0x2, [{0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x8}}, {0x8}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8}}}]}}, {{0x8, 0x1, r25}, {0x274, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8, 0x4, 0x5}}, {0x8, 0x6, r26}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x1}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x1000}}}, {0x44, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x14, 0x4, [{0xc5, 0x9, 0x7, 0xffffffffffffc236}, {0xfffffffffffffffc, 0xff, 0x2, 0x80000000}]}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x1f}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x7f}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x5c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x2c, 0x4, [{0x1f, 0xffffffffffffffff, 0x80, 0xffffffff}, {0x1, 0x0, 0x200, 0x9}, {0x9, 0x401, 0x3, 0x2}, {0x4, 0x2, 0x1, 0x8}, {0x7b, 0x6000, 0x3, 0x8}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0xecc}}}]}}, {{0x8, 0x1, r27}, {0x7c, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r28}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r29}}}]}}, {{0x8, 0x1, r30}, {0x80, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r31}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xae0f}}, {0x8, 0x6, r32}}}]}}]}, 0xd24}, 0x1, 0x0, 0x0, 0x8000}, 0x4000) [ 2395.540971][T11108] JFS: Cannot determine volume size 04:22:21 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x88caffff00000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:21 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r0, 0x0, 0x487, &(0x7f00000002c0), &(0x7f0000000300)=0x30) r1 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x4, 0x20000) ioctl$DRM_IOCTL_MAP_BUFS(r1, 0xc0186419, &(0x7f0000000280)={0x1, &(0x7f00000000c0)=""/251, &(0x7f0000000240)=[{0x9, 0x44, 0xf80, &(0x7f00000001c0)=""/68}]}) sendto$inet(r0, 0x0, 0x0, 0x80000400200007fe, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) bind$inet(r0, &(0x7f0000000000), 0x10) [ 2395.598980][T11108] JFS: Cannot determine volume size [ 2395.609524][T11108] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:22:21 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xffffff7f00000000, 0x0, 0x0, 0x0) [ 2395.693524][T11108] JFS: Cannot determine volume size [ 2395.699295][T11108] JFS: Cannot determine volume size [ 2395.749487][T11108] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:22:21 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000001700)={[{@resize='resize'}, {@resize='resize'}, {@resize_size={'resize'}}, {@discard_size={'discard', 0x3d, 0x200}}, {@iocharset={'iocharset', 0x3d, 'macroman'}}, {@resize_size={'resize', 0x3d, 0x400}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@euid_eq={'euid'}}], 0x6800000000000000}) 04:22:21 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000000)={0x6}) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) r1 = socket$nl_route(0x10, 0x3, 0x0) sendto(r1, &(0x7f0000000140)="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", 0x1000, 0x4000080, &(0x7f0000001140)=@nl=@kern={0x10, 0x0, 0x0, 0x10000}, 0x80) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f00000000c0)={&(0x7f0000000080)=[0x7f], 0x1, 0x5c, 0xb48, 0x8, 0x401, 0x100000000, {0x6, 0x8, 0x6b7, 0x6, 0x3ff, 0xffffffffffffff00, 0x1, 0x401, 0xc31, 0x1, 0x3ff, 0xf94, 0x4, 0x7fffffff, "f27196add9a2e65c3223fdd3d50beb77da9a491346c3a8c8098306be2fb19da5"}}) truncate(&(0x7f00000011c0)='./file0\x00', 0x3) 04:22:21 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x8906000000000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:21 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x10, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:21 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffff00000000, 0x0, 0x0, 0x0) 04:22:21 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80000400200007fe, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) bind$inet(r0, &(0x7f0000000000), 0x10) close(r0) 04:22:21 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000000)={0x6}) ioctl$DRM_IOCTL_GEM_OPEN(r0, 0xc010640b, &(0x7f0000000080)={0x0, 0x0, 0x10001}) ioctl$DRM_IOCTL_GEM_FLINK(r0, 0xc008640a, &(0x7f00000000c0)={0x0, 0x0}) ioctl$DRM_IOCTL_GEM_FLINK(r0, 0xc008640a, &(0x7f0000000100)={r1, r2}) 04:22:21 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffff0700, 0x0, 0x0, 0x0) 04:22:21 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x14, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:21 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) fallocate(r0, 0x5, 0x3, 0x1ff) sendto$inet(r0, 0x0, 0x0, 0x80000400200007fe, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) bind$inet(r0, &(0x7f0000000000), 0x10) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000004fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$void(r1, 0xc0045878) r2 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000280)='/dev/input/mouse#\x00', 0x0, 0x8000) setsockopt$bt_BT_RCVMTU(r3, 0x112, 0xd, &(0x7f00000002c0), 0x2) r4 = getpgid(0xffffffffffffffff) ioprio_set$pid(0x3, r4, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000140)) r5 = memfd_create(&(0x7f0000000080)='dev ', 0x5) ioctl$FS_IOC_RESVSP(r5, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0xa}) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r6, 0xc028564d, &(0x7f0000000140)={0x1, 0x1, [0x0, 0x5, 0x0, 0x0, 0xb2]}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r8 = memfd_create(0x0, 0x0) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_CREATE_BUFS(r8, 0xc100565c, &(0x7f0000000340)={0x3, 0xb7f8, 0x0, {0x0, @sliced={0xbd, [0x0, 0x10001, 0x8, 0x400000000, 0x1000, 0x9, 0x80, 0x0, 0x64fb, 0x0, 0xffff, 0x4f, 0x7f, 0x80000000, 0x9, 0x10000, 0x1, 0x300000, 0x8, 0x0, 0x4, 0x0, 0x0, 0x7, 0x9, 0x4, 0xfffffffffffffffc, 0x7ff, 0x0, 0xffffffff, 0x7, 0x1000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x81, 0xd34, 0x0, 0x2, 0x80000001, 0x9e, 0x1, 0x7, 0x9, 0xc18, 0x2], 0x1}}}) close(r7) r9 = add_key(&(0x7f0000000040)='asymmetric\x00', 0x0, &(0x7f00000001c0)="153520ae1e3b8f747ac285572a549ffe3c9f09fc8a2cc8abbab655c8953df46ff4eef00fced831ca9af9c813fd8c5e1674d6dc1d7cbdf94ca72af65e94c804c3109115070b9ca4767aeae60fe2fe3fb715dfdec6fa9afc7e3170876cbdcff42ea24eadcd8ff1e7bc3538a913dff6af14a6c65aa12a1346c9b6b7b129290552ed982d3c83a847a8fcaaf4556c19dd5847ee2f8b58a14dad8a9e50cfd4e5e4e5edb64cfc4915bdaa8bdae6f2f94d9e", 0xae, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r9, &(0x7f0000000500)='encrypted\x00', &(0x7f0000000540)='wlan1em0\\(mime_typewlan0ppp1ppp1proc[)}cpusetvboxnet1securityppp1self\x00') ftruncate(r2, 0x8200) mmap(&(0x7f0000006000/0x1000)=nil, 0x1000, 0x10800022, 0x11, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 04:22:21 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0xfeffffff00000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) [ 2395.938119][T11141] JFS: Cannot determine volume size 04:22:21 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffff7f, 0x0, 0x0, 0x0) [ 2395.986613][T11141] JFS: Cannot determine volume size [ 2396.004734][T11141] jfs: Unrecognized mount option "fscontext=system_u" or missing value [ 2396.105854][T11141] JFS: Cannot determine volume size [ 2396.111724][T11141] JFS: Cannot determine volume size [ 2396.117120][T11141] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:22:21 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000001700)={[{@resize='resize'}, {@resize='resize'}, {@resize_size={'resize'}}, {@discard_size={'discard', 0x3d, 0x200}}, {@iocharset={'iocharset', 0x3d, 'macroman'}}, {@resize_size={'resize', 0x3d, 0x400}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@euid_eq={'euid'}}], 0x6c00000000000000}) 04:22:21 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0xfffffffffffff000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:21 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x28, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:21 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000000)={0x6}) 04:22:21 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 04:22:21 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) listen(r0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = syz_open_procfs(0x0, &(0x7f00000001c0)='net/tcp6\x00') preadv(r2, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1, 0x0) 04:22:21 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0xffffffffffffffff}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:21 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0xf0, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:21 executing program 3: r0 = syz_open_dev$dri(&(0x7f00000000c0)='/dev/dri/card#\x00', 0x0, 0x400000) fcntl$F_GET_FILE_RW_HINT(r0, 0x40d, &(0x7f0000000040)) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000000)={0x6}) r1 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000180)='/dev/sequencer2\x00', 0x80, 0x0) getsockopt$inet_sctp_SCTP_PEER_AUTH_CHUNKS(0xffffffffffffff9c, 0x84, 0x1a, &(0x7f0000001380)=ANY=[@ANYRES32=0x0, @ANYBLOB="c8000000a9168e44434c38bba5c6f4bd1d8487cdd98f5fccf4c789b5173a718c78caddcdcb9f645f6a2b6bc6497e4da6ea03f61d4111812e51a520e17057333756309df23a557a9ca077e765edfd1bcc1516d079b5c96f6bccd8cff9e63551b96e9ad632b6f3293404ed6fef554911dbfa4191cb0c64128ac0401f94dd9c89aa8cb9fda43c50d2973830fe366b057e00c38f150dbdbfc917fb668c0838f4c270940bf42a747d2260bf7fdadd43edbe3c687a9af37031ec914d556285d9983e228428aae395b88bac2b02372a3255da5332a2006a2054bfe635d2b11dee11d4ea1286d43b3571029dbc450479bcd170d534bd582cff14e0a1b97a1b697207a2b7d2854778939aa3fdeaa5b7dd43c3e3d644817cf1ed2cb4a3942d6140cc2ec042e053ff9a80519e229a5fe3093605d7de7cce64b4d70c77983e8e141dc37bda0c9d9ce66ef3f923aa28f3857d7589fd6416e18ae4aed2"], &(0x7f00000002c0)=0xd0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000300)={r2, 0x1000, "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"}, &(0x7f0000001340)=0x1008) 04:22:21 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2, 0x0) [ 2396.304629][T11170] JFS: Cannot determine volume size 04:22:21 executing program 1: r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x0, 0x0) pread64(r0, 0x0, 0x0, 0x0) clone(0x802102001ff6, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) ioctl$KVM_SET_NR_MMU_PAGES(r0, 0xc0109207, 0x20000008) [ 2396.354021][T11170] JFS: Cannot determine volume size [ 2396.361138][T11170] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:22:21 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x300, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2396.463671][T11170] JFS: Cannot determine volume size [ 2396.483774][T11170] JFS: Cannot determine volume size [ 2396.495034][T11170] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:22:22 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000001700)={[{@resize='resize'}, {@resize='resize'}, {@resize_size={'resize'}}, {@discard_size={'discard', 0x3d, 0x200}}, {@iocharset={'iocharset', 0x3d, 'macroman'}}, {@resize_size={'resize', 0x3d, 0x400}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@euid_eq={'euid'}}], 0x7400000000000000}) 04:22:22 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x2}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:22 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000000)={0x6, 0xfffffffffffffffe}) 04:22:22 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x543, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:22 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x3, 0x0) 04:22:22 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x3}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:22 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x2201) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000080)={0x4000000000004, 0x1}) 04:22:22 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x600, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:22 executing program 3: r0 = syz_open_dev$swradio(&(0x7f0000000100)='/dev/swradio#\x00', 0x1, 0x2) write$FUSE_LSEEK(r0, &(0x7f0000000040)={0x18, 0x0, 0x4, {0xeb}}, 0x1) prctl$PR_SET_FPEXC(0xc, 0x20005) ioctl$DRM_IOCTL_GET_CAP(0xffffffffffffffff, 0xc010640c, &(0x7f0000000080)={0x7}) 04:22:22 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x4}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) [ 2396.782757][T11200] JFS: Cannot determine volume size [ 2396.803274][T11200] JFS: Cannot determine volume size [ 2396.829101][T11200] jfs: Unrecognized mount option "fscontext=system_u" or missing value [ 2396.904745][T11200] JFS: Cannot determine volume size [ 2396.910089][T11200] JFS: Cannot determine volume size [ 2396.915397][T11200] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:22:22 executing program 1: syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$vfat(&(0x7f0000000300)='vfat\x00', &(0x7f00000002c0)='./file0\x00', 0xe004, 0x1, &(0x7f0000000140)=[{&(0x7f0000010000)="eb3c906d6b66732e666174000204010002000270fff8", 0x16}], 0x0, 0x0) r0 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) fchdir(r0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r1, 0x1, 0x0, 0x369e5d84) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000100)='./file0\x00', 0x0) write$FUSE_INIT(0xffffffffffffffff, 0x0, 0x0) timer_settime(0x0, 0x0, 0x0, 0x0) 04:22:22 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x4, 0x0) 04:22:22 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x608, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:22 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x6}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:22 executing program 3: r0 = syz_open_dev$vbi(&(0x7f0000000080)='/dev/vbi#\x00', 0x3, 0x2) ioctl$sock_rose_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={@remote={0xcc, 0xcc, 0xcc, 0xcc, 0x1}, 0x80000001, @default, @netrom={'nr', 0x0}, 0x5, [@remote={0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0xcc, 0x3}, @bcast, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @bcast, @bcast, @bcast, @bcast]}) r1 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_CAP(r1, 0xc010640c, &(0x7f0000000000)={0x6}) 04:22:22 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000001700)={[{@resize='resize'}, {@resize='resize'}, {@resize_size={'resize'}}, {@discard_size={'discard', 0x3d, 0x200}}, {@iocharset={'iocharset', 0x3d, 'macroman'}}, {@resize_size={'resize', 0x3d, 0x400}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@euid_eq={'euid'}}], 0x7a00000000000000}) 04:22:22 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x7}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:22 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) r1 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/self/net/pfkey\x00', 0x80000, 0x0) ioctl$TCSETAF(r1, 0x5408, &(0x7f0000000100)={0x696, 0x0, 0xff, 0x9fc, 0x5, 0x2, 0x1, 0x9, 0xfee, 0x6}) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000000)={0x6}) ioctl$DRM_IOCTL_RM_MAP(r0, 0x4028641b, &(0x7f0000000080)={&(0x7f0000ffb000/0x3000)=nil, 0x40, 0x5, 0x80, &(0x7f0000ffc000/0x1000)=nil, 0x8}) getsockopt$inet_sctp_SCTP_STATUS(r1, 0x84, 0xe, &(0x7f0000000140)={0x0, 0x9, 0x2, 0x1ff, 0x100000000, 0x1, 0x1ff, 0xfffffffffffff800, {0x0, @in6={{0xa, 0x4e23, 0x7, @ipv4={[], [], @loopback}, 0x7}}, 0x9, 0x80000001, 0x18000, 0x9, 0x7f}}, &(0x7f0000000200)=0xb0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r1, 0x84, 0x7c, &(0x7f0000000240)={r2, 0x7730, 0x100000001}, &(0x7f0000000280)=0x8) [ 2397.288151][T11222] JFS: Cannot determine volume size [ 2397.299632][T11222] JFS: Cannot determine volume size 04:22:22 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x689, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:22 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000080)='net/ip6_tables_matches\x00') preadv(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/169, 0xa9}], 0x1, 0x1f6) [ 2397.330077][T11222] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:22:22 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x5, 0x0) 04:22:23 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x8}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) [ 2397.467838][T11222] JFS: Cannot determine volume size [ 2397.483461][T11222] JFS: Cannot determine volume size [ 2397.519559][T11222] jfs: Unrecognized mount option "fscontext=system_u" or missing value [ 2397.783245][ T26] audit: type=1804 audit(1547612543.310:172): pid=11237 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=open_writers comm="syz-executor1" name="/root/syzkaller-testdir912415545/syzkaller.IHOhBu/2556/file0" dev="sda1" ino=16590 res=1 [ 2397.815156][ T26] audit: type=1804 audit(1547612543.340:173): pid=11237 uid=0 auid=4294967295 ses=4294967295 subj==unconfined op=invalid_pcr cause=ToMToU comm="syz-executor1" name="/root/syzkaller-testdir912415545/syzkaller.IHOhBu/2556/file0" dev="sda1" ino=16590 res=1 04:22:23 executing program 1: r0 = socket$inet6(0xa, 0x1, 0x8010000000000084) bind$inet6(r0, &(0x7f0000ef8cfd)={0xa, 0x4e23, 0x0, @loopback}, 0x1c) listen(r0, 0xbd1b) r1 = socket$inet6_sctp(0xa, 0x5, 0x84) r2 = accept4(r0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_CONNECTX_OLD(r1, 0x84, 0x6b, &(0x7f000055bfe4)=[@in6={0xa, 0x4e23, 0x0, @loopback}], 0x1c) getsockopt$inet_sctp_SCTP_ASSOCINFO(r2, 0x84, 0x1, &(0x7f00000000c0), 0x0) 04:22:23 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x700, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:23 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0xd}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:23 executing program 3: bpf$PROG_LOAD(0x5, &(0x7f0000000180)={0x200000000010, 0x3, &(0x7f0000000000)=@framed={{0xffffffb4, 0x0, 0x0, 0x0, 0x0, 0x15}}, &(0x7f0000000080)='GPL\x04\x9c5\x14\xbfw-\xa0z\xe8.vY\n6\xf6I>\xc1\xab\x91\xb3\x97\xe4*\xbf\x1e\xa6\xcd\x8c\xd7t\'\xfc\x9a\x9e+qe\xf5+A\a\xbf\bP\xd8\x99\xdcR\xd0\x13\x17]\xdb\x1b/F <*\x05\xb7\"\xe3>Uo\xb2\xe3\xf3\x9a<\xde\x1f\xcaSd\x037\xec\x95aF\xbd\xbf\xcb\x11Pp\x19V1\xde]!\xa5\xea\x9ec\x8c+\xdbx\xa5\x01\xcaKn\xa3\x13\xd8%h\xf98,,?o\xab\xa6\xb4\xeeTy;N\xd2m\xae>R\"P)\xbb*\xc0\x00\x7fwuL?#\xce\xda\x98\t\xb9\xa9hJ\x94\n\xbc\xaa\x8c\xfc\xc7\x13>\xc4\"\xe9\xc88\x881\x8dA\xe9\xa4\x93\xf0\x19_\xe2Y\x96Q\xb8\x95\x04\xf5\xdb\xa1F%\xce#f\xf3=\x95\xdb\xa9/\x86ry\xca\xbfJ\xce\xdd\xc8Z\x8a\xf7\xa0\xfah\xd7g\xceQ6\xb9\xd0\xd1\x96lI\x9c\xb6\xbf4\xc2\x98\x86f\x97\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00'}, 0x48) 04:22:23 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000001700)={[{@resize='resize'}, {@resize='resize'}, {@resize_size={'resize'}}, {@discard_size={'discard', 0x3d, 0x200}}, {@iocharset={'iocharset', 0x3d, 'macroman'}}, {@resize_size={'resize', 0x3d, 0x400}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@euid_eq={'euid'}}], 0x8cffffff00000000}) 04:22:23 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x6, 0x0) 04:22:23 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x806, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2397.950805][T11262] JFS: Cannot determine volume size [ 2397.956156][T11262] JFS: Cannot determine volume size 04:22:23 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x10}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) [ 2398.014606][T11262] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:22:23 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x7, 0x0) [ 2398.149427][T11262] JFS: Cannot determine volume size 04:22:23 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x11}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:23 executing program 3: r0 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000040)='/dev/uhid\x00', 0x802, 0x0) write$UHID_GET_REPORT_REPLY(r0, &(0x7f0000000080), 0xa) [ 2398.199138][T11262] JFS: Cannot determine volume size [ 2398.204406][T11262] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:22:23 executing program 1: 04:22:23 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0xd00, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:23 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x8, 0x0) 04:22:23 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x14}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:23 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000001700)={[{@resize='resize'}, {@resize='resize'}, {@resize_size={'resize'}}, {@discard_size={'discard', 0x3d, 0x200}}, {@iocharset={'iocharset', 0x3d, 'macroman'}}, {@resize_size={'resize', 0x3d, 0x400}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@euid_eq={'euid'}}], 0xf6ffffff00000000}) 04:22:23 executing program 1: 04:22:23 executing program 3: 04:22:23 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0xe80, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:23 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x1c}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:23 executing program 1: 04:22:24 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x9, 0x0) 04:22:24 executing program 3: 04:22:24 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x1400, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2398.534789][T11298] JFS: Cannot determine volume size [ 2398.559324][T11298] JFS: Cannot determine volume size 04:22:24 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x0, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) writev(r0, &(0x7f0000000340)=[{&(0x7f0000000a80)="d85e678e676090b1343eb9c52bd02479d0747d8b2ab1410220300dba233c5193d6240d4a4d3d2a693cc7b07ce79ebbae29f214bee98043109616a4205ae885b9fa8c3b79353fa61bf3da3d814e673a4e0524a241d81a", 0x56}], 0x1) setsockopt$sock_int(r0, 0x1, 0xc, &(0x7f0000000140), 0x173) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000bc0)={0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r0, &(0x7f00000008c0)=ANY=[@ANYBLOB="7f454c4600010000000000040000000000003e0000000000000000003800000000000000042233e9c50000000000"], 0x2e) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 04:22:24 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x60}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:24 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x2000, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2398.581581][T11298] jfs: Unrecognized mount option "fscontext=system_u" or missing value [ 2398.770335][T11298] JFS: Cannot determine volume size [ 2398.775571][T11298] JFS: Cannot determine volume size [ 2398.804054][T11298] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:22:24 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000001700)={[{@resize='resize'}, {@resize='resize'}, {@resize_size={'resize'}}, {@discard_size={'discard', 0x3d, 0x200}}, {@iocharset={'iocharset', 0x3d, 'macroman'}}, {@resize_size={'resize', 0x3d, 0x400}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@euid_eq={'euid'}}], 0xf9fdffff00000000}) 04:22:24 executing program 3: 04:22:24 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xa, 0x0) 04:22:24 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x74, 0x4) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x0, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x10) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='bbr\x00', 0x4) writev(r0, &(0x7f0000000340)=[{&(0x7f0000000a80)="d85e678e676090b1343eb9c52bd02479d0747d8b2ab1410220300dba233c5193d6240d4a4d3d2a693cc7b07ce79ebbae29f214bee98043109616a4205ae885b9fa8c3b79353fa61bf3da3d814e673a4e0524a241d81a", 0x56}], 0x1) setsockopt$sock_int(r0, 0x1, 0xc, &(0x7f0000000140), 0x173) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(0xffffffffffffffff, 0x84, 0x75, &(0x7f0000000bc0)={0x0, 0x3}, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf32(r0, &(0x7f00000008c0)=ANY=[@ANYBLOB="7f454c4600010000000000040000000000003e0000000000000000003800000000000000042233e9c50000000000"], 0x2e) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) 04:22:24 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0xf0}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:24 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x2800, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:24 executing program 3: 04:22:24 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x3580, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:24 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x300}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:24 executing program 3: 04:22:24 executing program 1: 04:22:24 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x10, 0x0) [ 2399.136128][T11330] JFS: Cannot determine volume size [ 2399.153500][T11330] JFS: Cannot determine volume size [ 2399.189162][T11330] jfs: Unrecognized mount option "fscontext=system_u" or missing value [ 2399.264737][T11330] JFS: Cannot determine volume size [ 2399.270977][T11330] JFS: Cannot determine volume size [ 2399.276277][T11330] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:22:24 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000001700)={[{@resize='resize'}, {@resize='resize'}, {@resize_size={'resize'}}, {@discard_size={'discard', 0x3d, 0x200}}, {@iocharset={'iocharset', 0x3d, 'macroman'}}, {@resize_size={'resize', 0x3d, 0x400}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@euid_eq={'euid'}}], 0xfcfdffff00000000}) 04:22:24 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x3f00, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:24 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x543}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:24 executing program 3: 04:22:24 executing program 1: 04:22:24 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x23, 0x0) 04:22:25 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x600}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:25 executing program 1: 04:22:25 executing program 3: 04:22:25 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x4000, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2399.533147][T11353] JFS: Cannot determine volume size [ 2399.568522][T11353] JFS: Cannot determine volume size 04:22:25 executing program 3: 04:22:25 executing program 1: [ 2399.590495][T11353] jfs: Unrecognized mount option "fscontext=system_u" or missing value [ 2399.681307][T11353] JFS: Cannot determine volume size [ 2399.690091][T11353] JFS: Cannot determine volume size [ 2399.719379][T11353] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:22:25 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x4305, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:25 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x608}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:25 executing program 3: 04:22:25 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x48, 0x0) 04:22:25 executing program 1: 04:22:25 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000001700)={[{@resize='resize'}, {@resize='resize'}, {@resize_size={'resize'}}, {@discard_size={'discard', 0x3d, 0x200}}, {@iocharset={'iocharset', 0x3d, 'macroman'}}, {@resize_size={'resize', 0x3d, 0x400}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@euid_eq={'euid'}}], 0xfdfdffff00000000}) 04:22:25 executing program 3: 04:22:25 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x689}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:25 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x4788, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:25 executing program 1: 04:22:25 executing program 3: [ 2399.962152][T11375] JFS: Cannot determine volume size [ 2399.995607][T11375] JFS: Cannot determine volume size 04:22:25 executing program 1: 04:22:25 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x700}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) [ 2400.017205][T11375] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:22:25 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x4c, 0x0) 04:22:25 executing program 3: [ 2400.103309][T11375] JFS: Cannot determine volume size [ 2400.136474][T11375] JFS: Cannot determine volume size [ 2400.161342][T11375] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:22:25 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000001700)={[{@resize='resize'}, {@resize='resize'}, {@resize_size={'resize'}}, {@discard_size={'discard', 0x3d, 0x200}}, {@iocharset={'iocharset', 0x3d, 'macroman'}}, {@resize_size={'resize', 0x3d, 0x400}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@euid_eq={'euid'}}], 0xffffff7f00000000}) 04:22:25 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x4888, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:25 executing program 1: 04:22:25 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x806}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:25 executing program 3: 04:22:25 executing program 1: 04:22:25 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x68, 0x0) 04:22:25 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0xd00}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:26 executing program 3: 04:22:26 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x6488, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:26 executing program 1: [ 2400.452482][T11402] JFS: Cannot determine volume size [ 2400.469327][T11402] JFS: Cannot determine volume size [ 2400.474803][T11402] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:22:26 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0xe80}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:26 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000001700)={[{@resize='resize'}, {@resize='resize'}, {@resize_size={'resize'}}, {@discard_size={'discard', 0x3d, 0x200}}, {@iocharset={'iocharset', 0x3d, 'macroman'}}, {@resize_size={'resize', 0x3d, 0x400}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@euid_eq={'euid'}}], 0xffffffff00000000}) 04:22:26 executing program 3: 04:22:26 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x800e, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:26 executing program 1: 04:22:26 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x1100}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:26 executing program 3: 04:22:26 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x6c, 0x0) 04:22:26 executing program 1: [ 2400.742273][T11422] JFS: Cannot determine volume size 04:22:26 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x8035, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:26 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x1400}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) [ 2400.783757][T11422] JFS: Cannot determine volume size [ 2400.801797][T11422] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:22:26 executing program 3: 04:22:26 executing program 1: [ 2400.930473][T11422] JFS: Cannot determine volume size [ 2400.935712][T11422] JFS: Cannot determine volume size [ 2400.946183][T11422] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:22:26 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000001700)={[{@resize='resize'}, {@resize='resize'}, {@resize_size={'resize'}}, {@discard_size={'discard', 0x3d, 0x200}}, {@iocharset={'iocharset', 0x3d, 'macroman'}}, {@resize_size={'resize', 0x3d, 0x400}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@euid_eq={'euid'}}], 0xffffffffffffffff}) 04:22:26 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x74, 0x0) 04:22:26 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x1c00}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:26 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x8100, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:26 executing program 3: 04:22:26 executing program 1: 04:22:26 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x2000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:26 executing program 3: 04:22:26 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x8847, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:26 executing program 1: 04:22:26 executing program 3: 04:22:26 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x3580}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) [ 2401.252798][T11453] JFS: Cannot determine volume size [ 2401.258044][T11453] JFS: Cannot determine volume size [ 2401.309186][T11453] jfs: Unrecognized mount option "fscontext=system_u" or missing value [ 2401.410176][T11453] JFS: Cannot determine volume size [ 2401.415515][T11453] JFS: Cannot determine volume size [ 2401.426817][T11453] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:22:27 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000001700)={[{@resize='resize'}, {@resize='resize'}, {@resize_size={'resize'}}, {@discard_size={'discard', 0x3d, 0x200}}, {@iocharset={'iocharset', 0x3d, 'macroman'}}, {@resize_size={'resize', 0x3d, 0x400}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@euid_eq={'euid'}}]}) r0 = add_key$keyring(&(0x7f0000000040)='keyring\x00', &(0x7f0000000080)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffa) r1 = msgget(0x0, 0x2) msgrcv(r1, &(0x7f0000000140)={0x0, ""/3}, 0xb, 0x3, 0x800) keyctl$setperm(0x5, r0, 0x20000000) 04:22:27 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x7a, 0x0) 04:22:27 executing program 1: 04:22:27 executing program 3: 04:22:27 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x3f00}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:27 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x8848, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:27 executing program 1: 04:22:27 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x4305}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:27 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x8864, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:27 executing program 3: [ 2401.706762][T11472] JFS: Cannot determine volume size 04:22:27 executing program 1: 04:22:27 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x300, 0x0) [ 2401.743942][T11472] JFS: Cannot determine volume size [ 2401.765887][T11472] jfs: Unrecognized mount option "fscontext=system_u" or missing value [ 2401.844227][T11472] JFS: Cannot determine volume size [ 2401.850605][T11472] JFS: Cannot determine volume size [ 2401.855932][T11472] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:22:27 executing program 3: 04:22:27 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x8906, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:27 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x4788}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:27 executing program 1: 04:22:27 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x500, 0x0) 04:22:27 executing program 3: 04:22:27 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x4888}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:27 executing program 1: 04:22:27 executing program 0: r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000040)='/dev/hwrng\x00', 0x1, 0x0) ioctl$KDMKTONE(r0, 0x4b30, 0xffffffffffff8001) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000001700)={[{@resize='resize'}, {@resize='resize'}, {@resize_size={'resize'}}, {@discard_size={'discard', 0x3d, 0x200}}, {@iocharset={'iocharset', 0x3d, 'macroman'}}, {@resize_size={'resize', 0x3d, 0x400}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@euid_eq={'euid'}}]}) 04:22:27 executing program 1: socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000200)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = gettid() r2 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x0, 0x0) readv(r2, &(0x7f0000000700)=[{&(0x7f0000000440)=""/251, 0xfb}], 0x1) ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x6) 04:22:27 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x6000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:27 executing program 3: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$kcm(0xa, 0x2, 0x11) setsockopt$sock_attach_bpf(r1, 0x29, 0x1b, &(0x7f0000000040), 0x52d) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) r2 = socket$kcm(0xa, 0x2, 0x11) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) setsockopt$sock_attach_bpf(r2, 0x29, 0x1b, &(0x7f0000000040)=r2, 0x52d) socket$kcm(0x29, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, 0x0, 0x0) recvmsg(0xffffffffffffffff, 0x0, 0x40000102) ioctl$sock_kcm_SIOCKCMUNATTACH(0xffffffffffffffff, 0x89e1, 0x0) ioctl$TUNSETSTEERINGEBPF(0xffffffffffffffff, 0x800454e0, &(0x7f0000000600)) ioctl$TUNSETPERSIST(0xffffffffffffffff, 0x400454cb, 0x0) close(r2) socket$kcm(0x2b, 0x0, 0x0) sendmsg$kcm(0xffffffffffffffff, &(0x7f0000000480)={&(0x7f0000000040)=@un=@abs, 0x80, 0x0}, 0x0) socket$kcm(0x29, 0x0, 0x0) 04:22:27 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x600, 0x0) 04:22:27 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0xf000, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2402.295420][T11512] JFS: Cannot determine volume size 04:22:27 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0xf0ffff, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:27 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x6488}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:27 executing program 3: r0 = socket$alg(0x26, 0x5, 0x0) bind$alg(r0, &(0x7f00000000c0)={0x26, 'aead\x00', 0x0, 0x0, 'echainiv(ccm(serpent))\x00'}, 0x58) setsockopt$ALG_SET_KEY(r0, 0x117, 0x1, &(0x7f00000002c0)="a5d16d951529396b79e68531bc5d966476c629b3b36de82f5377fe4ab242f32d", 0x20) [ 2402.316133][T11512] JFS: Cannot determine volume size [ 2402.335458][T11512] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:22:27 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x700, 0x0) 04:22:27 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x1000000, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2402.425885][T11525] JFS: Cannot determine volume size [ 2402.457282][T11525] JFS: Cannot determine volume size 04:22:28 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x800e}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) [ 2402.493423][T11525] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:22:28 executing program 0: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-monitor\x00', 0x24901, 0x0) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, &(0x7f0000000080)={0x0, 0x284}, &(0x7f0000000100)=0x8) setsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000140)={r1, 0x1b73}, 0x8) ioctl$UI_SET_SWBIT(r0, 0x4004556d, 0x8) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000001700)={[{@resize='resize'}, {@resize='resize'}, {@resize_size={'resize'}}, {@discard_size={'discard', 0x3d, 0x200}}, {@iocharset={'iocharset', 0x3d, 'macroman'}}, {@resize_size={'resize', 0x3d, 0x400}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@euid_eq={'euid'}}]}) setsockopt$inet_sctp_SCTP_MAX_BURST(r0, 0x84, 0x14, &(0x7f0000000180)=@int=0x7, 0x4) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000200)='TIPCv2\x00') sendmsg$TIPC_NL_NET_SET(r0, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000380)={&(0x7f0000000400)=ANY=[@ANYBLOB="20011000a5159ab021ef608e3f2cee2bf2789c198329aea2a2d5efc0a326c44fff2f01eac810c81a39e3f1e8d105087bc7f5a84e47dbebe217814c51cfbfb4be538d233c8702b54dd8e6cad0e5731793f1fb3ba5294119a02afdf399a91413751e5a950000000000006a7a000000", @ANYRES16=r2, @ANYBLOB="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"], 0x120}, 0x1, 0x0, 0x0, 0x11}, 0x8000) [ 2402.707713][T11556] JFS: Cannot determine volume size [ 2402.717981][T11556] JFS: Cannot determine volume size [ 2402.747105][T11556] jfs: Unrecognized mount option "fscontext=system_u" or missing value [ 2402.859497][T11564] JFS: Cannot determine volume size [ 2402.864739][T11564] JFS: Cannot determine volume size [ 2402.870024][T11564] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:22:30 executing program 1: openat$cgroup_ro(0xffffffffffffffff, 0x0, 0x2761, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000000)={0x0, 0x0, 0x0, &(0x7f00000001c0)='GPL\x00'}, 0x48) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000780)='/jstat\x00\xc6S\x81\xb4z\xae\xdf*\xf5\xc8\xaf4#\xfcA\x89\x1b\xd2\xa3\xc5m\x8c\x88\xe2\x9b\xadC\xf1\xda\x90n\x85_\xf1\x82\xde\x04\"~\xdc\xbb\xc2\xb1\xdf\x8f\x18\x0e\x15\x8e\x8a\xbdD,\xc0I\xcf\xfd\xa00\xff\'xu\xee\x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x06\x9e[\xdd\xcf%\xcd\x7f#\x95kJ\x82\xdf\x90\x0f^\xb5v;O\xe8\xccqr\x96-%\x90\xb2\xdc\xa2\xa10\x8c8%A\xb0S\x19>\xe7\xba.2\x80\x85\x7f\x8f\x9fc\xfc\x90\xba\xe9Y\xc6\xe6px\xbf\x97\xe6\x15\xbf\xd9@\x99\x14\x95\x8a\xad\xcf\xb3ys\xda<`\xd85&\xe5\xc2g\xf7\xdf\xa5K\xd5$\xcc\x96q\xde\xddfQ\x992+\xda\xde\xe1%\xa3[@\xb7\xbe\f\a0\x1fC\x9a~\xdf\xa2o\xa9\x82w\xc8\a\x8b\x02\xe2\ab\x91\xc37\x87\xc5\x8b\x0e\xab\xbc9(\x8f\xc1\x05\t@\x9d\xe1\b\xf5\xca&\xa8\xc8\xff\xaf\xb7\v*\x95i\xcf\x8fL\xdbmN\x97\xeb\x7f\xdf$\x1d\xee\x16\x0e`qa\x833\xcc\v\x0e\x8b\xc6\xa1z\v}`EP\xfd\x14\x9a\xd0x\xff\xe5Lc\x92\xfb\xa2\x90\x15\xa3\xaeswL\xd1,\x9c\x0e\xd2Q\xa7\xcf\x84=q-\x00\x00\x00\x00\x9b\x82\x11j<\x17Y\x1d0vjX\v\xab5p\x92\x16\xab\x97\xa7S\xd6\\y\xd5\xa4\xbbW\xaa}\xcf\xa0\xed\x1d\xa4\xa4\rG', 0x2761, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x4030582a, &(0x7f0000000000)) 04:22:30 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x2000000, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:30 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x8035}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:30 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x900, 0x0) 04:22:30 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x70, 0x910, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCEXCL(r1, 0x540c) 04:22:30 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, 0x0, 0x80000000, &(0x7f00000001c0)={[{@resize='resize'}, {@resize='resize'}, {@resize_size={'resize'}}, {@discard_size={'discard', 0x3d, 0x200}}, {@discard_size={'discard', 0x3d, 0x100}}, {@resize_size={'resize', 0x3d, 0x400}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@euid_eq={'euid'}}]}) 04:22:30 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x8100}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:30 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x3000000, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:30 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x700, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:31 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x8847}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:31 executing program 1: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) fallocate(r0, 0x5, 0x3, 0x1ff) sendto$inet(r0, 0x0, 0x0, 0x80000400200007fe, &(0x7f0000000080)={0x2, 0x0, @local}, 0x10) bind$inet(r0, &(0x7f0000000000), 0x10) openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0) r1 = syz_open_dev$sndpcmc(&(0x7f0000004fee)='/dev/snd/pcmC#D#c\x00', 0x0, 0x0) ioctl$void(r1, 0xc0045878) r2 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x3e8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_dev$mouse(&(0x7f0000000280)='/dev/input/mouse#\x00', 0x0, 0x8000) setsockopt$bt_BT_RCVMTU(r3, 0x112, 0xd, &(0x7f00000002c0), 0x2) r4 = getpgid(0xffffffffffffffff) ioprio_set$pid(0x3, r4, 0x0) ioctl$BLKGETSIZE(0xffffffffffffffff, 0x1260, &(0x7f0000000140)) r5 = memfd_create(&(0x7f0000000080)='dev ', 0x5) ioctl$FS_IOC_RESVSP(r5, 0x40305828, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0xa}) r6 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x0, 0x0) ioctl$VIDIOC_ENCODER_CMD(r6, 0xc028564d, &(0x7f0000000140)={0x1, 0x1, [0x0, 0x5, 0x0, 0x0, 0xb2]}) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r8 = memfd_create(0x0, 0x0) bind$vsock_stream(0xffffffffffffffff, 0x0, 0x0) read$FUSE(0xffffffffffffffff, 0x0, 0x0) ioctl$VIDIOC_CREATE_BUFS(r8, 0xc100565c, &(0x7f0000000340)={0x3, 0xb7f8, 0x0, {0x0, @sliced={0xbd, [0x0, 0x10001, 0x8, 0x400000000, 0x1000, 0x9, 0x80, 0x0, 0x64fb, 0x0, 0xffff, 0x4f, 0x7f, 0x80000000, 0x9, 0x10000, 0x1, 0x300000, 0x8, 0x0, 0x4, 0x0, 0x0, 0x7, 0x9, 0x4, 0xfffffffffffffffc, 0x7ff, 0x0, 0xffffffff, 0x7, 0x1000, 0x0, 0x0, 0xfffffffffffffffc, 0x0, 0x81, 0xd34, 0x0, 0x2, 0x80000001, 0x9e, 0x1, 0x7, 0x9, 0xc18, 0x2], 0x1}}}) close(r7) r9 = add_key(&(0x7f0000000040)='asymmetric\x00', 0x0, &(0x7f00000001c0)="153520ae1e3b8f747ac285572a549ffe3c9f09fc8a2cc8abbab655c8953df46ff4eef00fced831ca9af9c813fd8c5e1674d6dc1d7cbdf94ca72af65e94c804c3109115070b9ca4767aeae60fe2fe3fb715dfdec6fa9afc7e3170876cbdcff42ea24eadcd8ff1e7bc3538a913dff6af14a6c65aa12a1346c9b6b7b129290552ed982d3c83a847a8fcaaf4556c19dd5847ee2f8b58a14dad8a9e50cfd4e5e4e5edb64cfc4915bdaa8bdae6f2f94d9e", 0xae, 0xfffffffffffffffc) keyctl$restrict_keyring(0x1d, r9, &(0x7f0000000500)='encrypted\x00', &(0x7f0000000540)='wlan1em0\\(mime_typewlan0ppp1ppp1proc[)}cpusetvboxnet1securityppp1self\x00') ftruncate(r2, 0x8200) mmap(&(0x7f0000006000/0x1000)=nil, 0x1000, 0x10800022, 0x11, 0xffffffffffffffff, 0x0) socket$inet_udplite(0x2, 0x2, 0x88) 04:22:31 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x6000000, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:31 executing program 0: fstat(0xffffffffffffff9c, &(0x7f0000000040)) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x1, &(0x7f00000001c0)={[{@discard='discard'}, {@discard_size={'discard', 0x3d, 0x80}}, {@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'macgreek'}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@smackfsdef={'smackfsdef', 0x3d, 'usernodev[]@mime_type%}[&nodev'}}]}) 04:22:31 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x200000000000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:31 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x8848}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:31 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xa00, 0x0) 04:22:31 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x7000000, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:31 executing program 3: r0 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$alg(0x26, 0x5, 0x0) bind$alg(r1, &(0x7f0000000000)={0x26, 'hash\x00', 0x0, 0x0, 'sha256-generic\x00'}, 0x58) r2 = accept4$alg(r1, 0x0, 0x0, 0x0) recvmmsg(r2, &(0x7f0000002480), 0x120, 0x0, &(0x7f00000001c0)={0x77359400}) r3 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x7, 0x0) ioctl$VIDIOC_ENUM_DV_TIMINGS(r3, 0xc0945662, &(0x7f00000000c0)={0x2, 0x0, [], {0x0, @bt={0x7, 0x80000000, 0x1, 0x1, 0xab65, 0x2, 0x3, 0x8000, 0x3, 0x200, 0x6, 0x7, 0x80000000, 0x3f}}}) ioctl$DRM_IOCTL_GET_CAP(r0, 0xc010640c, &(0x7f0000000000)={0x6}) ioctl$DRM_IOCTL_AGP_FREE(r0, 0x40206435, &(0x7f0000000180)={0x1ff, 0x0, 0x0, 0x3}) 04:22:31 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x8864}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:31 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x2, 0xa040) bind$inet6(r0, 0x0, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x101000000000001, 0x4) mkdir(&(0x7f0000000700)='./file1\x00', 0x100) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c653100d5d909"]) setxattr$system_posix_acl(&(0x7f0000000300)='./file1/file0\x00', &(0x7f0000000380)='system.posix_acl_access\x00', &(0x7f0000000cc0)={{}, {}, [{}], {0x4, 0x5}, [{0x8, 0x4}, {0x8, 0x5}, {0x8, 0x1}]}, 0x44, 0x1) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) connect$inet6(r0, 0x0, 0x0) chdir(&(0x7f00000002c0)='./file0\x00') r2 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_CAP(r2, 0xc010640c, &(0x7f0000000000)={0x6}) ioctl$DRM_IOCTL_MODESET_CTL(r2, 0x40086408, &(0x7f0000000080)={0x3808, 0x1}) [ 2405.677626][T11600] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:22:31 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x354, 0x0, 0x1, &(0x7f0000000280)=ANY=[@ANYBLOB="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", @ANYRESDEC=0x0, @ANYRES64]) 04:22:31 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x8000000, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:31 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x8906}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:31 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xf19, 0x0) 04:22:31 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x17c, 0x0, 0x20008, &(0x7f0000001700)={[], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@euid_eq={'euid'}}]}) r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x80000, 0x0) ioctl$TUNGETSNDBUF(r0, 0x800454d3, &(0x7f0000000080)) 04:22:31 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x8060000, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:31 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0xf000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:31 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000001700)=ANY=[@ANYBLOB='resize,resize,resize=0x0000000000000000,discard=0x0000000000000200,iocharset=macroman,resize=0x0000000000000400,fscontext=system_u,euid=', @ANYRESDEC=0x0, @ANYBLOB='(\x00']) 04:22:31 executing program 3: fstat(0xffffffffffffff9c, &(0x7f0000000040)) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x1, &(0x7f00000001c0)={[{@discard='discard'}, {@discard_size={'discard', 0x3d, 0x80}}, {@nointegrity='nointegrity'}, {@iocharset={'iocharset', 0x3d, 'macgreek'}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@smackfsdef={'smackfsdef', 0x3d, 'usernodev[]@mime_type%}[&nodev'}}]}) 04:22:31 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1020, 0x0) 04:22:31 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0xf0ffff}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:31 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0xd000000, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:31 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x2, 0xa040) bind$inet6(r0, 0x0, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x101000000000001, 0x4) mkdir(&(0x7f0000000700)='./file1\x00', 0x100) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c653100d5d909"]) setxattr$system_posix_acl(&(0x7f0000000300)='./file1/file0\x00', &(0x7f0000000380)='system.posix_acl_access\x00', &(0x7f0000000cc0)={{}, {}, [{}], {0x4, 0x5}, [{0x8, 0x4}, {0x8, 0x5}, {0x8, 0x1}]}, 0x44, 0x1) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) connect$inet6(r0, 0x0, 0x0) chdir(&(0x7f00000002c0)='./file0\x00') r2 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_CAP(r2, 0xc010640c, &(0x7f0000000000)={0x6}) ioctl$DRM_IOCTL_MODESET_CTL(r2, 0x40086408, &(0x7f0000000080)={0x3808, 0x1}) [ 2406.247831][T11637] JFS: Cannot determine volume size 04:22:31 executing program 3: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x543}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) [ 2406.287992][T11637] JFS: Cannot determine volume size 04:22:31 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x10000000, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:31 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x1000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) [ 2406.315290][T11637] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:22:31 executing program 3 (fault-call:0 fault-nth:0): syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 04:22:31 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000013c0)=ANY=[@ANYBLOB='resize,resize,resize=0x0000000000000000,discard=0x\x00\x0000000000000200,iocharset=macroman,resize=0x0000000000000400,fscontext=system_u,euid=', @ANYRESDEC=0x0, @ANYBLOB="3c002848518a3e86111a3d7a32bab456661ddf9c86e4eb4fba07737151a58dc80ca0e22e477d22e8fe95ffea0eb6109a741fe9ca0f14fdf4dd88591a3e4ab127e37067bffceea965240272d103a48891ca70eb1579af945db1a0cb1f006a24de458c266f0a0757d251a01c97ab80a5df5b293bddf9f302e45dc752cc191ed428d08868c5b912098bc6914f48a63e73c02878156e47ced802e59f32ebe8f5d922854f72261acc976000b050c063cf2565f90d9b414c996b6402340a6104cd"]) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x4000, 0x0) sendto$x25(r0, &(0x7f00000001c0)="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", 0xd1c, 0x440c2, 0x0, 0x0) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000001240)={0x0, 0x0}, &(0x7f0000001280)=0xc) mount$9p_fd(0x0, &(0x7f00000011c0)='./file0/file0\x00', &(0x7f0000001200)='9p\x00', 0x8, &(0x7f00000012c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@uname={'uname', 0x3d, 'jfs\x00'}}, {@mmap='mmap'}, {@cachetag={'cachetag', 0x3d, 'system'}}, {@cache_fscache='cache=fscache'}, {@privport='privport'}, {@cachetag={'cachetag', 0x3d, '/dev/ubi_ctrl\x00'}}, {@posixacl='posixacl'}, {@version_L='version=9p2000.L'}, {@access_client='access=client'}, {@mmap='mmap'}], [{@fowner_lt={'fowner<', r1}}]}}) r2 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ubi_ctrl\x00', 0x200, 0x0) readlinkat(r2, &(0x7f0000000080)='./file0/file0\x00', &(0x7f0000000100)=""/25, 0x19) setsockopt$inet_mtu(r2, 0x0, 0xa, &(0x7f0000000140)=0x4, 0x4) 04:22:31 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x2000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:32 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x14000000, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:32 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x190f, 0x0) [ 2406.512027][T11659] FAULT_INJECTION: forcing a failure. [ 2406.512027][T11659] name failslab, interval 1, probability 0, space 0, times 0 [ 2406.574065][T11659] CPU: 1 PID: 11659 Comm: syz-executor3 Not tainted 5.0.0-rc2-next-20190115 #12 [ 2406.583123][T11659] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2406.593189][T11659] Call Trace: [ 2406.596500][T11659] dump_stack+0x1db/0x2d0 [ 2406.600855][T11659] ? dump_stack_print_info.cold+0x20/0x20 [ 2406.606604][T11659] should_fail.cold+0xa/0x14 [ 2406.611215][T11659] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2406.617034][T11659] ? ___might_sleep+0x1e7/0x310 [ 2406.617051][T11659] ? arch_local_save_flags+0x50/0x50 [ 2406.617076][T11659] __should_failslab+0x121/0x190 [ 2406.627186][T11659] should_failslab+0x9/0x14 [ 2406.627206][T11659] __kmalloc+0x2dc/0x740 [ 2406.627225][T11659] ? strncpy_from_user+0x4e0/0x4e0 [ 2406.645968][T11659] ? fput+0x128/0x1a0 [ 2406.649961][T11659] ? do_syscall_64+0x8c/0x800 [ 2406.654649][T11659] ? __x64_sys_memfd_create+0x13c/0x4b0 [ 2406.660233][T11659] __x64_sys_memfd_create+0x13c/0x4b0 [ 2406.665616][T11659] ? memfd_fcntl+0x1870/0x1870 [ 2406.670401][T11659] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2406.675885][T11659] do_syscall_64+0x1a3/0x800 [ 2406.680493][T11659] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2406.686142][T11659] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2406.691876][T11659] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2406.697437][T11659] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2406.703334][T11659] RIP: 0033:0x457ec9 04:22:32 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x3000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:32 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x4000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) [ 2406.707234][T11659] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2406.726838][T11659] RSP: 002b:00007f7fc991fa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2406.726852][T11659] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457ec9 [ 2406.726861][T11659] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bce80 [ 2406.726870][T11659] RBP: 000000000073bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 2406.726879][T11659] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7fc99206d4 04:22:32 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x20000000, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2406.726887][T11659] R13: 00000000004c669c R14: 00000000004db990 R15: 0000000000000003 [ 2406.813318][T11664] JFS: Cannot determine volume size [ 2406.827782][T11664] JFS: Cannot determine volume size [ 2406.847107][T11664] jfs: Unrecognized mount option "discard=0x" or missing value 04:22:32 executing program 1: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0x2, 0xa040) bind$inet6(r0, 0x0, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x13, &(0x7f0000000040)=0x101000000000001, 0x4) mkdir(&(0x7f0000000700)='./file1\x00', 0x100) creat(&(0x7f0000000340)='./file1/file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() sched_setscheduler(r1, 0x5, &(0x7f0000000040)) mkdir(&(0x7f0000000180)='./file0\x00', 0x0) mount$overlay(0x400000, &(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)='overlay\x00', 0x0, &(0x7f0000000c40)=ANY=[@ANYBLOB="75707065726469723d2e2f66696c65302c6c6f7765726469723d2e2f66696c65312c776f726b6469723d2e2f66696c653100d5d909"]) setxattr$system_posix_acl(&(0x7f0000000300)='./file1/file0\x00', &(0x7f0000000380)='system.posix_acl_access\x00', &(0x7f0000000cc0)={{}, {}, [{}], {0x4, 0x5}, [{0x8, 0x4}, {0x8, 0x5}, {0x8, 0x1}]}, 0x44, 0x1) chdir(&(0x7f0000000280)='./file0\x00') openat$dir(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x526, 0x0) connect$inet6(r0, 0x0, 0x0) chdir(&(0x7f00000002c0)='./file0\x00') r2 = syz_open_dev$dri(&(0x7f0000000040)='/dev/dri/card#\x00', 0x0, 0x0) ioctl$DRM_IOCTL_GET_CAP(r2, 0xc010640c, &(0x7f0000000000)={0x6}) ioctl$DRM_IOCTL_MODESET_CTL(r2, 0x40086408, &(0x7f0000000080)={0x3808, 0x1}) 04:22:32 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x6000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:32 executing program 3 (fault-call:0 fault-nth:1): syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 04:22:32 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x28000000, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:32 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1f00, 0x0) [ 2406.961674][T11664] JFS: Cannot determine volume size [ 2406.966905][T11664] JFS: Cannot determine volume size [ 2406.966922][T11664] jfs: Unrecognized mount option "discard=0x" or missing value 04:22:32 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000001700)=ANY=[@ANYBLOB="726573697a652c726573697a652c726573697a653d3078303030303030303030303030303030302c646973636172643d3078303030303030303030303030303230302c696f636861727365743d6d6163726f6d616e2c726573697a653d30783030303030303030303030303034303209533123c0302c6673636f6e746578743d73797374656d5f75", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 04:22:32 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x3f000000, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2407.044497][T11682] FAULT_INJECTION: forcing a failure. [ 2407.044497][T11682] name failslab, interval 1, probability 0, space 0, times 0 [ 2407.105098][T11682] CPU: 1 PID: 11682 Comm: syz-executor3 Not tainted 5.0.0-rc2-next-20190115 #12 [ 2407.114171][T11682] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2407.124239][T11682] Call Trace: [ 2407.127553][T11682] dump_stack+0x1db/0x2d0 [ 2407.131896][T11682] ? dump_stack_print_info.cold+0x20/0x20 [ 2407.137626][T11682] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2407.143616][T11682] ? print_usage_bug+0xd0/0xd0 [ 2407.148392][T11682] should_fail.cold+0xa/0x14 [ 2407.152990][T11682] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2407.158808][T11682] ? ___might_sleep+0x1e7/0x310 [ 2407.163664][T11682] ? arch_local_save_flags+0x50/0x50 [ 2407.168961][T11682] __should_failslab+0x121/0x190 [ 2407.173904][T11682] should_failslab+0x9/0x14 [ 2407.178405][T11682] kmem_cache_alloc+0x2be/0x710 [ 2407.183263][T11682] ? shmem_destroy_callback+0xc0/0xc0 [ 2407.188636][T11682] shmem_alloc_inode+0x1c/0x50 [ 2407.193397][T11682] alloc_inode+0x66/0x190 [ 2407.197727][T11682] new_inode_pseudo+0x71/0x1b0 [ 2407.202496][T11682] ? prune_icache_sb+0x1c0/0x1c0 [ 2407.207531][T11682] ? _raw_spin_unlock+0x2d/0x50 [ 2407.212386][T11682] new_inode+0x1f/0x40 [ 2407.216462][T11682] shmem_get_inode+0xe1/0x8d0 [ 2407.221151][T11682] ? shmem_encode_fh+0x340/0x340 [ 2407.226088][T11682] ? lock_downgrade+0xbe0/0xbe0 [ 2407.230941][T11682] ? lock_release+0xc40/0xc40 [ 2407.235619][T11682] ? __check_object_size+0xa3/0x790 [ 2407.240827][T11682] __shmem_file_setup.part.0+0x7e/0x2b0 [ 2407.246380][T11682] shmem_file_setup+0x66/0x90 [ 2407.251059][T11682] __x64_sys_memfd_create+0x2a2/0x4b0 [ 2407.256430][T11682] ? memfd_fcntl+0x1870/0x1870 [ 2407.261202][T11682] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2407.266685][T11682] do_syscall_64+0x1a3/0x800 [ 2407.271280][T11682] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2407.276934][T11682] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2407.282657][T11682] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2407.288213][T11682] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2407.294101][T11682] RIP: 0033:0x457ec9 [ 2407.297994][T11682] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2407.317592][T11682] RSP: 002b:00007f7fc991fa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2407.325998][T11682] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457ec9 [ 2407.333964][T11682] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bce80 [ 2407.341934][T11682] RBP: 000000000073bf00 R08: 0000000000000000 R09: 00000000fbad8001 04:22:32 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x7000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) [ 2407.349899][T11682] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7fc99206d4 [ 2407.357865][T11682] R13: 00000000004c669c R14: 00000000004db990 R15: 0000000000000003 [ 2407.396390][T11687] JFS: Cannot determine volume size 04:22:32 executing program 3 (fault-call:0 fault-nth:2): syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 2407.419256][T11687] JFS: Cannot determine volume size [ 2407.427717][T11687] jfs: Unrecognized mount option "resize=0x0000000000000402 S1#À0" or missing value 04:22:33 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000, 0x0) 04:22:33 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x8000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:33 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x40000000, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2407.532690][T11698] FAULT_INJECTION: forcing a failure. [ 2407.532690][T11698] name failslab, interval 1, probability 0, space 0, times 0 [ 2407.551175][T11687] JFS: Cannot determine volume size [ 2407.556404][T11687] JFS: Cannot determine volume size [ 2407.609160][T11698] CPU: 0 PID: 11698 Comm: syz-executor3 Not tainted 5.0.0-rc2-next-20190115 #12 [ 2407.618225][T11698] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2407.628287][T11698] Call Trace: [ 2407.631598][T11698] dump_stack+0x1db/0x2d0 [ 2407.635949][T11698] ? dump_stack_print_info.cold+0x20/0x20 [ 2407.641683][T11698] ? new_inode_pseudo+0x71/0x1b0 [ 2407.646628][T11698] ? new_inode+0x1f/0x40 [ 2407.650876][T11698] ? shmem_get_inode+0xe1/0x8d0 [ 2407.655737][T11698] ? __shmem_file_setup.part.0+0x7e/0x2b0 [ 2407.661471][T11698] ? shmem_file_setup+0x66/0x90 [ 2407.666328][T11698] ? do_syscall_64+0x1a3/0x800 [ 2407.671111][T11698] should_fail.cold+0xa/0x14 [ 2407.675712][T11698] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2407.681534][T11698] ? ___might_sleep+0x1e7/0x310 [ 2407.686393][T11698] ? arch_local_save_flags+0x50/0x50 [ 2407.691680][T11698] ? lockdep_init_map+0x10c/0x5b0 [ 2407.696724][T11698] __should_failslab+0x121/0x190 [ 2407.701675][T11698] should_failslab+0x9/0x14 [ 2407.706190][T11698] kmem_cache_alloc+0x2be/0x710 [ 2407.711049][T11698] ? kasan_check_read+0x11/0x20 [ 2407.715915][T11698] __d_alloc+0xae/0xbe0 [ 2407.720086][T11698] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 2407.725928][T11698] ? _raw_spin_unlock+0x2d/0x50 [ 2407.730789][T11698] ? inode_sb_list_add+0x223/0x310 [ 2407.735922][T11698] ? current_time+0x104/0x1b0 [ 2407.740632][T11698] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2407.746883][T11698] ? lockdep_init_map+0x10c/0x5b0 [ 2407.751923][T11698] d_alloc_pseudo+0x1e/0x30 04:22:33 executing program 1 (fault-call:3 fault-nth:0): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) [ 2407.756453][T11698] alloc_file_pseudo+0x14f/0x3b0 [ 2407.761409][T11698] ? alloc_file+0x4d0/0x4d0 [ 2407.765932][T11698] ? __check_object_size+0xa3/0x790 [ 2407.771152][T11698] __shmem_file_setup.part.0+0x108/0x2b0 [ 2407.776792][T11698] shmem_file_setup+0x66/0x90 [ 2407.781479][T11698] __x64_sys_memfd_create+0x2a2/0x4b0 [ 2407.786851][T11698] ? memfd_fcntl+0x1870/0x1870 [ 2407.791623][T11698] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2407.797091][T11698] do_syscall_64+0x1a3/0x800 [ 2407.802197][T11698] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2407.807844][T11698] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2407.813573][T11698] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2407.819250][T11698] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2407.825155][T11698] RIP: 0033:0x457ec9 [ 2407.829052][T11698] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2407.848751][T11698] RSP: 002b:00007f7fc991fa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f 04:22:33 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x8060000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:33 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x43050000, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2407.857178][T11698] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457ec9 [ 2407.865152][T11698] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bce80 [ 2407.873128][T11698] RBP: 000000000073bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 2407.881098][T11698] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7fc99206d4 [ 2407.889063][T11698] R13: 00000000004c669c R14: 00000000004db990 R15: 0000000000000003 [ 2407.897849][T11687] jfs: Unrecognized mount option "resize=0x0000000000000402 S1#À0" or missing value 04:22:33 executing program 3 (fault-call:0 fault-nth:3): syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 04:22:33 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010, 0x0) 04:22:33 executing program 0: setxattr$security_evm(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='security.evm\x00', &(0x7f00000000c0)=@md5={0x1, "613194f00d6d96939fea8bfb6c383d7f"}, 0x11, 0x2) syz_mount_image$jfs(&(0x7f0000000200)='jfs\x00', &(0x7f00000001c0)='./file0\x00', 0x9, 0x0, 0x0, 0x1, &(0x7f0000000080)) [ 2408.022446][T11710] FAULT_INJECTION: forcing a failure. [ 2408.022446][T11710] name failslab, interval 1, probability 0, space 0, times 0 [ 2408.072036][T11718] FAULT_INJECTION: forcing a failure. [ 2408.072036][T11718] name failslab, interval 1, probability 0, space 0, times 0 [ 2408.080841][T11710] CPU: 1 PID: 11710 Comm: syz-executor1 Not tainted 5.0.0-rc2-next-20190115 #12 [ 2408.093707][T11710] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2408.103766][T11710] Call Trace: [ 2408.107067][T11710] dump_stack+0x1db/0x2d0 [ 2408.111433][T11710] ? dump_stack_print_info.cold+0x20/0x20 [ 2408.117162][T11710] should_fail.cold+0xa/0x14 [ 2408.121757][T11710] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2408.127565][T11710] ? ___might_sleep+0x1e7/0x310 [ 2408.132421][T11710] ? arch_local_save_flags+0x50/0x50 [ 2408.137713][T11710] __should_failslab+0x121/0x190 [ 2408.142645][T11710] should_failslab+0x9/0x14 [ 2408.147145][T11710] __kmalloc+0x2dc/0x740 [ 2408.151384][T11710] ? strncpy_from_user+0x4e0/0x4e0 [ 2408.156495][T11710] ? fput+0x128/0x1a0 [ 2408.160471][T11710] ? do_syscall_64+0x8c/0x800 [ 2408.165142][T11710] ? __x64_sys_memfd_create+0x13c/0x4b0 [ 2408.170686][T11710] __x64_sys_memfd_create+0x13c/0x4b0 [ 2408.176051][T11710] ? memfd_fcntl+0x1870/0x1870 [ 2408.180811][T11710] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2408.186283][T11710] do_syscall_64+0x1a3/0x800 [ 2408.190872][T11710] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2408.196501][T11710] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2408.202223][T11710] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2408.207778][T11710] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2408.213662][T11710] RIP: 0033:0x457ec9 [ 2408.217554][T11710] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2408.237150][T11710] RSP: 002b:00007f18dfc72a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2408.245555][T11710] RAX: ffffffffffffffda RBX: 0000000020000680 RCX: 0000000000457ec9 [ 2408.253520][T11710] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bce80 [ 2408.261481][T11710] RBP: 000000000073bf00 R08: 0000000000000008 R09: 00000000fbad8001 04:22:33 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x800e0000, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:33 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0xd000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) [ 2408.269447][T11710] R10: 0000000020000680 R11: 0000000000000246 R12: 00007f18dfc736d4 [ 2408.277418][T11710] R13: 00000000004c669c R14: 00000000004db990 R15: 0000000000000004 [ 2408.285416][T11718] CPU: 0 PID: 11718 Comm: syz-executor3 Not tainted 5.0.0-rc2-next-20190115 #12 [ 2408.294438][T11718] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2408.304611][T11718] Call Trace: [ 2408.307915][T11718] dump_stack+0x1db/0x2d0 [ 2408.312250][T11718] ? dump_stack_print_info.cold+0x20/0x20 [ 2408.317966][T11718] ? percpu_ref_put_many+0x129/0x270 [ 2408.323266][T11718] should_fail.cold+0xa/0x14 [ 2408.327864][T11718] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2408.333678][T11718] ? ___might_sleep+0x1e7/0x310 [ 2408.338528][T11718] ? arch_local_save_flags+0x50/0x50 [ 2408.343829][T11718] __should_failslab+0x121/0x190 [ 2408.348776][T11718] should_failslab+0x9/0x14 [ 2408.353277][T11718] kmem_cache_alloc+0x2be/0x710 [ 2408.358129][T11718] ? d_instantiate+0x7b/0xa0 [ 2408.362718][T11718] ? find_held_lock+0x35/0x120 [ 2408.367490][T11718] __alloc_file+0x93/0x480 [ 2408.371909][T11718] ? ____fput+0x20/0x20 [ 2408.376073][T11718] ? kasan_check_read+0x11/0x20 [ 2408.380922][T11718] ? do_raw_spin_unlock+0xa0/0x330 [ 2408.386033][T11718] ? do_raw_spin_trylock+0x270/0x270 [ 2408.391326][T11718] alloc_empty_file+0x72/0x170 [ 2408.396096][T11718] alloc_file+0x5e/0x4d0 [ 2408.400357][T11718] alloc_file_pseudo+0x24a/0x3b0 [ 2408.405325][T11718] ? alloc_file+0x4d0/0x4d0 [ 2408.409834][T11718] ? __check_object_size+0xa3/0x790 [ 2408.415044][T11718] __shmem_file_setup.part.0+0x108/0x2b0 [ 2408.420679][T11718] shmem_file_setup+0x66/0x90 [ 2408.425357][T11718] __x64_sys_memfd_create+0x2a2/0x4b0 [ 2408.430822][T11718] ? memfd_fcntl+0x1870/0x1870 [ 2408.435587][T11718] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2408.441055][T11718] do_syscall_64+0x1a3/0x800 [ 2408.445667][T11718] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2408.451303][T11718] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2408.457030][T11718] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2408.462589][T11718] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2408.468481][T11718] RIP: 0033:0x457ec9 [ 2408.472374][T11718] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2408.491984][T11718] RSP: 002b:00007f7fc991fa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2408.500400][T11718] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457ec9 [ 2408.508380][T11718] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bce80 [ 2408.516347][T11718] RBP: 000000000073bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 2408.524336][T11718] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7fc99206d4 [ 2408.532310][T11718] R13: 00000000004c669c R14: 00000000004db990 R15: 0000000000000003 04:22:34 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x80350000, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:34 executing program 1 (fault-call:3 fault-nth:1): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) 04:22:34 executing program 3 (fault-call:0 fault-nth:4): syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 04:22:34 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x10000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:34 executing program 0: lstat(&(0x7f0000000080)='./file0\x00', &(0x7f0000000280)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000000)='./file0\x00', 0x3, 0xfffffffffffffdfd, 0x0, 0x1, &(0x7f0000000300)={[{@grpquota='grpquota'}, {@resize='resize'}, {@resize_size={'resize'}}, {@quota='quota'}, {@nodiscard='nodiscard'}, {@usrquota='usrquota'}], [{@mask={'mask', 0x3d, 'MAY_READ'}}, {@euid_eq={'euid'}}]}) [ 2408.729422][T11728] FAULT_INJECTION: forcing a failure. [ 2408.729422][T11728] name failslab, interval 1, probability 0, space 0, times 0 [ 2408.764244][T11730] FAULT_INJECTION: forcing a failure. [ 2408.764244][T11730] name failslab, interval 1, probability 0, space 0, times 0 [ 2408.793900][T11728] CPU: 0 PID: 11728 Comm: syz-executor3 Not tainted 5.0.0-rc2-next-20190115 #12 [ 2408.802963][T11728] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2408.813128][T11728] Call Trace: [ 2408.816440][T11728] dump_stack+0x1db/0x2d0 [ 2408.820816][T11728] ? dump_stack_print_info.cold+0x20/0x20 [ 2408.826548][T11728] ? __shmem_file_setup.part.0+0x108/0x2b0 [ 2408.826565][T11728] ? shmem_file_setup+0x66/0x90 [ 2408.826582][T11728] ? __x64_sys_memfd_create+0x2a2/0x4b0 [ 2408.826603][T11728] ? do_syscall_64+0x1a3/0x800 [ 2408.847534][T11728] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2408.853607][T11728] should_fail.cold+0xa/0x14 [ 2408.858222][T11728] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2408.864054][T11728] ? ___might_sleep+0x1e7/0x310 [ 2408.868915][T11728] ? arch_local_save_flags+0x50/0x50 [ 2408.874211][T11728] ? rcu_lockdep_current_cpu_online+0x1aa/0x220 [ 2408.880474][T11728] __should_failslab+0x121/0x190 [ 2408.885425][T11728] should_failslab+0x9/0x14 [ 2408.885446][T11728] kmem_cache_alloc+0x2be/0x710 [ 2408.885463][T11728] ? __alloc_file+0x93/0x480 [ 2408.885484][T11728] ? rcu_read_lock_sched_held+0x110/0x130 [ 2408.905110][T11728] ? kmem_cache_alloc+0x341/0x710 [ 2408.905136][T11728] security_file_alloc+0x39/0x170 [ 2408.905156][T11728] __alloc_file+0x128/0x480 [ 2408.905174][T11728] ? ____fput+0x20/0x20 [ 2408.919807][T11728] ? kasan_check_read+0x11/0x20 [ 2408.919827][T11728] ? do_raw_spin_unlock+0xa0/0x330 [ 2408.919844][T11728] ? do_raw_spin_trylock+0x270/0x270 [ 2408.919869][T11728] alloc_empty_file+0x72/0x170 [ 2408.919887][T11728] alloc_file+0x5e/0x4d0 [ 2408.919906][T11728] alloc_file_pseudo+0x24a/0x3b0 [ 2408.928880][T11728] ? alloc_file+0x4d0/0x4d0 [ 2408.928899][T11728] ? __check_object_size+0xa3/0x790 [ 2408.928929][T11728] __shmem_file_setup.part.0+0x108/0x2b0 [ 2408.928949][T11728] shmem_file_setup+0x66/0x90 [ 2408.928965][T11728] __x64_sys_memfd_create+0x2a2/0x4b0 [ 2408.928979][T11728] ? memfd_fcntl+0x1870/0x1870 [ 2408.928995][T11728] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2408.929017][T11728] do_syscall_64+0x1a3/0x800 [ 2408.993344][T11728] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2408.998985][T11728] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2409.004715][T11728] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2409.010272][T11728] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2409.016163][T11728] RIP: 0033:0x457ec9 [ 2409.020145][T11728] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2409.039778][T11728] RSP: 002b:00007f7fc991fa88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2409.048192][T11728] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 0000000000457ec9 [ 2409.056176][T11728] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bce80 [ 2409.064145][T11728] RBP: 000000000073bf00 R08: 0000000000000000 R09: 00000000fbad8001 [ 2409.072116][T11728] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f7fc99206d4 [ 2409.080086][T11728] R13: 00000000004c669c R14: 00000000004db990 R15: 0000000000000003 [ 2409.088079][T11730] CPU: 1 PID: 11730 Comm: syz-executor1 Not tainted 5.0.0-rc2-next-20190115 #12 [ 2409.097106][T11730] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2409.107162][T11730] Call Trace: [ 2409.110471][T11730] dump_stack+0x1db/0x2d0 [ 2409.114822][T11730] ? dump_stack_print_info.cold+0x20/0x20 [ 2409.120550][T11730] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2409.126529][T11730] ? print_usage_bug+0xd0/0xd0 [ 2409.131301][T11730] should_fail.cold+0xa/0x14 [ 2409.135901][T11730] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2409.141712][T11730] ? ___might_sleep+0x1e7/0x310 [ 2409.146566][T11730] ? arch_local_save_flags+0x50/0x50 [ 2409.151864][T11730] __should_failslab+0x121/0x190 [ 2409.156805][T11730] should_failslab+0x9/0x14 [ 2409.161310][T11730] kmem_cache_alloc+0x2be/0x710 [ 2409.166176][T11730] ? shmem_destroy_callback+0xc0/0xc0 [ 2409.171553][T11730] shmem_alloc_inode+0x1c/0x50 [ 2409.176314][T11730] alloc_inode+0x66/0x190 [ 2409.180651][T11730] new_inode_pseudo+0x71/0x1b0 [ 2409.185410][T11730] ? prune_icache_sb+0x1c0/0x1c0 [ 2409.190356][T11730] ? _raw_spin_unlock+0x2d/0x50 [ 2409.195305][T11730] new_inode+0x1f/0x40 [ 2409.199383][T11730] shmem_get_inode+0xe1/0x8d0 [ 2409.204066][T11730] ? shmem_encode_fh+0x340/0x340 [ 2409.209007][T11730] ? lock_downgrade+0xbe0/0xbe0 [ 2409.213861][T11730] ? lock_release+0xc40/0xc40 [ 2409.218533][T11730] ? __check_object_size+0xa3/0x790 [ 2409.223745][T11730] __shmem_file_setup.part.0+0x7e/0x2b0 [ 2409.229298][T11730] shmem_file_setup+0x66/0x90 [ 2409.233987][T11730] __x64_sys_memfd_create+0x2a2/0x4b0 [ 2409.239619][T11730] ? memfd_fcntl+0x1870/0x1870 [ 2409.244389][T11730] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2409.249854][T11730] do_syscall_64+0x1a3/0x800 [ 2409.254446][T11730] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2409.260080][T11730] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2409.265808][T11730] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2409.271372][T11730] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2409.277264][T11730] RIP: 0033:0x457ec9 [ 2409.281159][T11730] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2409.300847][T11730] RSP: 002b:00007f18dfc72a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2409.309257][T11730] RAX: ffffffffffffffda RBX: 0000000020000680 RCX: 0000000000457ec9 [ 2409.317234][T11730] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bce80 [ 2409.325209][T11730] RBP: 000000000073bf00 R08: 0000000000000008 R09: 00000000fbad8001 [ 2409.333187][T11730] R10: 0000000020000680 R11: 0000000000000246 R12: 00007f18dfc736d4 04:22:34 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000001700)={[{@resize='resize'}, {@resize='resize'}, {@resize_size={'resize'}}, {@discard_size={'discard', 0x3d, 0x200}}, {@iocharset={'iocharset', 0x3d, 'macroman'}}, {@resize_size={'resize', 0x3d, 0x400}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@euid_eq={'euid'}}]}) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x2000, 0x0) dup3(r0, r0, 0x80000) write$P9_RAUTH(r0, &(0x7f0000000080)={0x14, 0x67, 0x2, {0x0, 0x3, 0x6}}, 0x14) 04:22:34 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x81000000, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:34 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2300, 0x0) 04:22:34 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x11000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) [ 2409.341181][T11730] R13: 00000000004c669c R14: 00000000004db990 R15: 0000000000000004 04:22:34 executing program 3 (fault-call:0 fault-nth:5): syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 04:22:34 executing program 1 (fault-call:3 fault-nth:2): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) 04:22:34 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x86ddffff, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:35 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x14000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) [ 2409.428063][T11744] JFS: Cannot determine volume size [ 2409.439565][T11744] JFS: Cannot determine volume size [ 2409.445019][T11744] jfs: Unrecognized mount option "fscontext=system_u" or missing value [ 2409.503950][T11751] FAULT_INJECTION: forcing a failure. [ 2409.503950][T11751] name failslab, interval 1, probability 0, space 0, times 0 [ 2409.512046][T11752] FAULT_INJECTION: forcing a failure. [ 2409.512046][T11752] name failslab, interval 1, probability 0, space 0, times 0 04:22:35 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x3f00, 0x0) [ 2409.563046][T11744] JFS: Cannot determine volume size [ 2409.567677][T11751] CPU: 0 PID: 11751 Comm: syz-executor3 Not tainted 5.0.0-rc2-next-20190115 #12 [ 2409.568378][T11744] JFS: Cannot determine volume size [ 2409.577305][T11751] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2409.577312][T11751] Call Trace: [ 2409.577341][T11751] dump_stack+0x1db/0x2d0 [ 2409.577363][T11751] ? dump_stack_print_info.cold+0x20/0x20 [ 2409.577381][T11751] ? inode_init_owner+0x340/0x340 [ 2409.577400][T11751] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2409.577425][T11751] should_fail.cold+0xa/0x14 [ 2409.577444][T11751] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2409.577473][T11751] ? ___might_sleep+0x1e7/0x310 [ 2409.627783][T11751] ? arch_local_save_flags+0x50/0x50 [ 2409.627806][T11751] ? evm_inode_post_setattr+0x47/0x70 [ 2409.627826][T11751] __should_failslab+0x121/0x190 [ 2409.641771][T11744] jfs: Unrecognized mount option "fscontext=system_u" or missing value [ 2409.643300][T11751] should_failslab+0x9/0x14 [ 2409.643321][T11751] kmem_cache_alloc+0x2be/0x710 [ 2409.643342][T11751] ? find_held_lock+0x35/0x120 [ 2409.656491][T11751] ? do_sys_ftruncate+0x41e/0x550 [ 2409.656511][T11751] getname_flags+0xd6/0x5b0 [ 2409.656528][T11751] getname+0x1a/0x20 [ 2409.656544][T11751] do_sys_open+0x3a5/0x7c0 [ 2409.656564][T11751] ? filp_open+0x80/0x80 [ 2409.656585][T11751] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2409.656603][T11751] ? trace_hardirqs_off_caller+0x300/0x300 [ 2409.656620][T11751] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2409.656638][T11751] __x64_sys_open+0x7e/0xc0 [ 2409.675725][T11751] do_syscall_64+0x1a3/0x800 [ 2409.675744][T11751] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2409.688513][T11751] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2409.688535][T11751] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2409.688562][T11751] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2409.688575][T11751] RIP: 0033:0x411e71 04:22:35 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x88470000, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2409.688593][T11751] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 2409.698852][T11751] RSP: 002b:00007f7fc991fa80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 2409.698868][T11751] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000411e71 [ 2409.698878][T11751] RDX: 00007f7fc991fafa RSI: 0000000000000002 RDI: 00007f7fc991faf0 [ 2409.698887][T11751] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2409.698896][T11751] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 04:22:35 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x1c000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:35 executing program 3 (fault-call:0 fault-nth:6): syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 2409.698905][T11751] R13: 0000000000000000 R14: 00000000004db990 R15: 0000000000000003 [ 2409.759494][T11752] CPU: 0 PID: 11752 Comm: syz-executor1 Not tainted 5.0.0-rc2-next-20190115 #12 [ 2409.774413][T11752] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2409.774420][T11752] Call Trace: [ 2409.774444][T11752] dump_stack+0x1db/0x2d0 [ 2409.774464][T11752] ? dump_stack_print_info.cold+0x20/0x20 [ 2409.847088][T11752] ? new_inode_pseudo+0x71/0x1b0 [ 2409.852022][T11752] ? new_inode+0x1f/0x40 [ 2409.856263][T11752] ? shmem_get_inode+0xe1/0x8d0 [ 2409.861120][T11752] ? __shmem_file_setup.part.0+0x7e/0x2b0 [ 2409.866922][T11752] ? shmem_file_setup+0x66/0x90 [ 2409.871777][T11752] ? do_syscall_64+0x1a3/0x800 [ 2409.876549][T11752] should_fail.cold+0xa/0x14 [ 2409.881147][T11752] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2409.886985][T11752] ? ___might_sleep+0x1e7/0x310 [ 2409.891841][T11752] ? arch_local_save_flags+0x50/0x50 [ 2409.897123][T11752] ? lockdep_init_map+0x10c/0x5b0 [ 2409.902160][T11752] __should_failslab+0x121/0x190 [ 2409.907103][T11752] should_failslab+0x9/0x14 [ 2409.911605][T11752] kmem_cache_alloc+0x2be/0x710 [ 2409.916462][T11752] ? kasan_check_read+0x11/0x20 [ 2409.921323][T11752] __d_alloc+0xae/0xbe0 [ 2409.925485][T11752] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 2409.931301][T11752] ? _raw_spin_unlock+0x2d/0x50 [ 2409.936152][T11752] ? inode_sb_list_add+0x223/0x310 [ 2409.941280][T11752] ? current_time+0x104/0x1b0 [ 2409.945962][T11752] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2409.952208][T11752] ? lockdep_init_map+0x10c/0x5b0 [ 2409.957242][T11752] d_alloc_pseudo+0x1e/0x30 [ 2409.961757][T11752] alloc_file_pseudo+0x14f/0x3b0 [ 2409.966712][T11752] ? alloc_file+0x4d0/0x4d0 [ 2409.971569][T11752] ? __check_object_size+0xa3/0x790 [ 2409.976792][T11752] __shmem_file_setup.part.0+0x108/0x2b0 [ 2409.982435][T11752] shmem_file_setup+0x66/0x90 [ 2409.987115][T11752] __x64_sys_memfd_create+0x2a2/0x4b0 [ 2409.992488][T11752] ? memfd_fcntl+0x1870/0x1870 [ 2409.997269][T11752] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2410.002771][T11752] do_syscall_64+0x1a3/0x800 [ 2410.007371][T11752] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2410.013008][T11752] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2410.018740][T11752] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2410.024305][T11752] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2410.030202][T11752] RIP: 0033:0x457ec9 [ 2410.034100][T11752] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2410.053705][T11752] RSP: 002b:00007f18dfc72a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2410.062123][T11752] RAX: ffffffffffffffda RBX: 0000000020000680 RCX: 0000000000457ec9 [ 2410.070095][T11752] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bce80 [ 2410.078064][T11752] RBP: 000000000073bf00 R08: 0000000000000008 R09: 00000000fbad8001 [ 2410.086040][T11752] R10: 0000000020000680 R11: 0000000000000246 R12: 00007f18dfc736d4 [ 2410.094011][T11752] R13: 00000000004c669c R14: 00000000004db990 R15: 0000000000000004 04:22:35 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="726573697a652c726573697a652c726573697a653d307830303030303030303030303030b030302c646973636172643d3078303030303030303030303026208ab3fd61374b636861727365743d6d6163726f6d616e2c726573697a653d3078303030303030303030303030303430302c6673636f6e746578743d73797374656d5f752c65ffff643d", @ANYRESDEC=0x0, @ANYPTR]) r0 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x208000, 0x128) setsockopt$inet_udp_encap(r0, 0x11, 0x64, &(0x7f00000002c0)=0x5, 0xffffffffffffff9c) ioctl$SNDRV_CTL_IOCTL_CARD_INFO(r0, 0x81785501, &(0x7f00000001c0)=""/96) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0x40505412, &(0x7f0000000240)={0x0, 0x7, 0x81, 0x0, 0x1f}) 04:22:35 executing program 1 (fault-call:3 fault-nth:3): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) [ 2410.187026][T11767] FAULT_INJECTION: forcing a failure. [ 2410.187026][T11767] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2410.200296][T11767] CPU: 0 PID: 11767 Comm: syz-executor3 Not tainted 5.0.0-rc2-next-20190115 #12 [ 2410.209318][T11767] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2410.219377][T11767] Call Trace: [ 2410.222687][T11767] dump_stack+0x1db/0x2d0 [ 2410.227028][T11767] ? dump_stack_print_info.cold+0x20/0x20 [ 2410.232752][T11767] ? add_lock_to_list.isra.0+0x450/0x450 [ 2410.238400][T11767] should_fail.cold+0xa/0x14 [ 2410.242998][T11767] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2410.248805][T11767] ? find_held_lock+0x35/0x120 [ 2410.253576][T11767] ? shmem_setattr+0x54b/0xd90 [ 2410.258341][T11767] ? find_held_lock+0x35/0x120 [ 2410.263109][T11767] ? shmem_setattr+0x54b/0xd90 [ 2410.267965][T11767] ? lock_acquire+0x1db/0x570 [ 2410.272652][T11767] should_fail_alloc_page+0x50/0x60 [ 2410.277856][T11767] __alloc_pages_nodemask+0x323/0xdc0 [ 2410.283225][T11767] ? inode_init_owner+0x340/0x340 [ 2410.288272][T11767] ? __alloc_pages_slowpath+0x2c60/0x2c60 [ 2410.294006][T11767] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2410.300268][T11767] ? ___might_sleep+0x1e7/0x310 [ 2410.305148][T11767] ? trace_hardirqs_off+0xb8/0x310 [ 2410.310267][T11767] cache_grow_begin+0x9c/0x8c0 [ 2410.315030][T11767] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2410.321279][T11767] ? check_preemption_disabled+0x48/0x290 [ 2410.327006][T11767] kmem_cache_alloc+0x645/0x710 [ 2410.331855][T11767] ? find_held_lock+0x35/0x120 [ 2410.336621][T11767] ? do_sys_ftruncate+0x41e/0x550 [ 2410.341648][T11767] getname_flags+0xd6/0x5b0 [ 2410.346158][T11767] getname+0x1a/0x20 [ 2410.350056][T11767] do_sys_open+0x3a5/0x7c0 [ 2410.354473][T11767] ? filp_open+0x80/0x80 [ 2410.358718][T11767] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2410.364787][T11767] ? trace_hardirqs_off_caller+0x300/0x300 [ 2410.370603][T11767] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2410.376063][T11767] __x64_sys_open+0x7e/0xc0 [ 2410.380652][T11767] do_syscall_64+0x1a3/0x800 [ 2410.385255][T11767] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2410.390886][T11767] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2410.396803][T11767] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2410.402362][T11767] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2410.408256][T11767] RIP: 0033:0x411e71 [ 2410.412150][T11767] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 04:22:36 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x88480000, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2410.431754][T11767] RSP: 002b:00007f7fc991fa80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 2410.440161][T11767] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000411e71 [ 2410.448128][T11767] RDX: 00007f7fc991fafa RSI: 0000000000000002 RDI: 00007f7fc991faf0 [ 2410.456097][T11767] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2410.464064][T11767] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 2410.472034][T11767] R13: 0000000000000000 R14: 00000000004db990 R15: 0000000000000003 04:22:36 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x20000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:36 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x4000, 0x0) [ 2410.543303][T11770] FAULT_INJECTION: forcing a failure. [ 2410.543303][T11770] name failslab, interval 1, probability 0, space 0, times 0 [ 2410.590697][T11775] JFS: Cannot determine volume size [ 2410.611261][T11770] CPU: 1 PID: 11770 Comm: syz-executor1 Not tainted 5.0.0-rc2-next-20190115 #12 [ 2410.620317][T11770] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2410.630373][T11770] Call Trace: [ 2410.633687][T11770] dump_stack+0x1db/0x2d0 [ 2410.638037][T11770] ? dump_stack_print_info.cold+0x20/0x20 [ 2410.643772][T11770] ? percpu_ref_put_many+0x129/0x270 [ 2410.649067][T11770] should_fail.cold+0xa/0x14 [ 2410.649092][T11770] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2410.649115][T11770] ? ___might_sleep+0x1e7/0x310 [ 2410.659580][T11770] ? arch_local_save_flags+0x50/0x50 [ 2410.669698][T11770] __should_failslab+0x121/0x190 [ 2410.674737][T11770] should_failslab+0x9/0x14 [ 2410.679256][T11770] kmem_cache_alloc+0x2be/0x710 [ 2410.684131][T11770] ? d_instantiate+0x7b/0xa0 [ 2410.688727][T11770] ? find_held_lock+0x35/0x120 [ 2410.693506][T11770] __alloc_file+0x93/0x480 [ 2410.697928][T11770] ? ____fput+0x20/0x20 [ 2410.702104][T11770] ? kasan_check_read+0x11/0x20 [ 2410.706968][T11770] ? do_raw_spin_unlock+0xa0/0x330 [ 2410.712095][T11770] ? do_raw_spin_trylock+0x270/0x270 [ 2410.717387][T11770] alloc_empty_file+0x72/0x170 [ 2410.722266][T11770] alloc_file+0x5e/0x4d0 [ 2410.726554][T11770] alloc_file_pseudo+0x24a/0x3b0 [ 2410.731588][T11770] ? alloc_file+0x4d0/0x4d0 [ 2410.736100][T11770] ? __check_object_size+0xa3/0x790 [ 2410.741322][T11770] __shmem_file_setup.part.0+0x108/0x2b0 [ 2410.746960][T11770] shmem_file_setup+0x66/0x90 [ 2410.751739][T11770] __x64_sys_memfd_create+0x2a2/0x4b0 [ 2410.757124][T11770] ? memfd_fcntl+0x1870/0x1870 [ 2410.761896][T11770] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2410.767366][T11770] do_syscall_64+0x1a3/0x800 [ 2410.771959][T11770] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2410.777590][T11770] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2410.783318][T11770] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2410.788893][T11770] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2410.794786][T11770] RIP: 0033:0x457ec9 [ 2410.798681][T11770] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2410.818279][T11770] RSP: 002b:00007f18dfc72a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2410.826689][T11770] RAX: ffffffffffffffda RBX: 0000000020000680 RCX: 0000000000457ec9 [ 2410.834658][T11770] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bce80 [ 2410.842628][T11770] RBP: 000000000073bf00 R08: 0000000000000008 R09: 00000000fbad8001 [ 2410.850699][T11770] R10: 0000000020000680 R11: 0000000000000246 R12: 00007f18dfc736d4 04:22:36 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x3f000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:36 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x43050000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:36 executing program 3 (fault-call:0 fault-nth:7): syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 04:22:36 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x88640000, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2410.858668][T11770] R13: 00000000004c669c R14: 00000000004db990 R15: 0000000000000004 [ 2410.875771][T11775] JFS: Cannot determine volume size [ 2410.901493][T11775] jfs: Unrecognized mount option "resize=0x0000000000000°00" or missing value 04:22:36 executing program 1 (fault-call:3 fault-nth:4): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) [ 2410.918300][T11787] FAULT_INJECTION: forcing a failure. [ 2410.918300][T11787] name failslab, interval 1, probability 0, space 0, times 0 [ 2410.937127][T11787] CPU: 1 PID: 11787 Comm: syz-executor3 Not tainted 5.0.0-rc2-next-20190115 #12 [ 2410.946205][T11787] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2410.956261][T11787] Call Trace: [ 2410.959557][T11787] dump_stack+0x1db/0x2d0 [ 2410.963881][T11787] ? dump_stack_print_info.cold+0x20/0x20 [ 2410.969594][T11787] should_fail.cold+0xa/0x14 [ 2410.974170][T11787] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2410.979976][T11787] ? ___might_sleep+0x1e7/0x310 [ 2410.984897][T11787] ? arch_local_save_flags+0x50/0x50 [ 2410.990165][T11787] ? print_usage_bug+0xd0/0xd0 [ 2410.994929][T11787] __should_failslab+0x121/0x190 [ 2410.999854][T11787] should_failslab+0x9/0x14 [ 2411.004342][T11787] kmem_cache_alloc+0x2be/0x710 [ 2411.009176][T11787] ? __lock_acquire+0x572/0x4a10 [ 2411.014103][T11787] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2411.020332][T11787] __alloc_file+0x93/0x480 [ 2411.024733][T11787] ? ____fput+0x20/0x20 [ 2411.028873][T11787] ? mark_held_locks+0x100/0x100 [ 2411.033803][T11787] alloc_empty_file+0x72/0x170 [ 2411.038554][T11787] path_openat+0x112/0x5660 [ 2411.043049][T11787] ? add_lock_to_list.isra.0+0x450/0x450 [ 2411.048673][T11787] ? __alloc_fd+0x549/0x700 [ 2411.053164][T11787] ? find_held_lock+0x35/0x120 [ 2411.057920][T11787] ? path_lookupat.isra.0+0xba0/0xba0 [ 2411.063276][T11787] ? do_dup2+0x580/0x580 [ 2411.067509][T11787] ? kasan_check_read+0x11/0x20 [ 2411.072345][T11787] ? do_raw_spin_unlock+0xa0/0x330 [ 2411.077440][T11787] ? do_raw_spin_trylock+0x270/0x270 [ 2411.082712][T11787] ? __phys_addr_symbol+0x30/0x70 [ 2411.087729][T11787] do_filp_open+0x26f/0x370 [ 2411.092227][T11787] ? may_open_dev+0x100/0x100 [ 2411.096991][T11787] ? exit_files+0xb0/0xb0 [ 2411.101308][T11787] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2411.107534][T11787] ? digsig_verify.cold+0x32/0x32 [ 2411.112649][T11787] ? get_unused_fd_flags+0x122/0x1a0 [ 2411.117919][T11787] ? __alloc_fd+0x700/0x700 [ 2411.122414][T11787] ? getname_flags+0x277/0x5b0 [ 2411.127164][T11787] do_sys_open+0x59a/0x7c0 [ 2411.131573][T11787] ? filp_open+0x80/0x80 [ 2411.135805][T11787] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2411.141855][T11787] ? trace_hardirqs_off_caller+0x300/0x300 [ 2411.147644][T11787] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2411.153090][T11787] __x64_sys_open+0x7e/0xc0 [ 2411.157586][T11787] do_syscall_64+0x1a3/0x800 [ 2411.162176][T11787] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2411.167793][T11787] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2411.173500][T11787] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2411.179053][T11787] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2411.184929][T11787] RIP: 0033:0x411e71 [ 2411.188810][T11787] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 2411.208398][T11787] RSP: 002b:00007f7fc991fa80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 04:22:36 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x60000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:36 executing program 3 (fault-call:0 fault-nth:8): syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 2411.216792][T11787] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000411e71 [ 2411.224755][T11787] RDX: 00007f7fc991fafa RSI: 0000000000000002 RDI: 00007f7fc991faf0 [ 2411.232706][T11787] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2411.240660][T11787] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 2411.248613][T11787] R13: 0000000000000000 R14: 00000000004db990 R15: 0000000000000003 [ 2411.355615][T11794] FAULT_INJECTION: forcing a failure. [ 2411.355615][T11794] name failslab, interval 1, probability 0, space 0, times 0 [ 2411.367511][T11796] FAULT_INJECTION: forcing a failure. [ 2411.367511][T11796] name failslab, interval 1, probability 0, space 0, times 0 [ 2411.412536][T11796] CPU: 1 PID: 11796 Comm: syz-executor1 Not tainted 5.0.0-rc2-next-20190115 #12 [ 2411.421598][T11796] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2411.431664][T11796] Call Trace: [ 2411.434978][T11796] dump_stack+0x1db/0x2d0 [ 2411.439331][T11796] ? dump_stack_print_info.cold+0x20/0x20 [ 2411.445158][T11796] ? __shmem_file_setup.part.0+0x108/0x2b0 [ 2411.450960][T11796] ? shmem_file_setup+0x66/0x90 [ 2411.455805][T11796] ? __x64_sys_memfd_create+0x2a2/0x4b0 [ 2411.461349][T11796] ? do_syscall_64+0x1a3/0x800 [ 2411.466114][T11796] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2411.472194][T11796] should_fail.cold+0xa/0x14 [ 2411.476789][T11796] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2411.482617][T11796] ? ___might_sleep+0x1e7/0x310 [ 2411.487465][T11796] ? arch_local_save_flags+0x50/0x50 [ 2411.492753][T11796] ? rcu_lockdep_current_cpu_online+0x1aa/0x220 [ 2411.498996][T11796] __should_failslab+0x121/0x190 [ 2411.503934][T11796] should_failslab+0x9/0x14 [ 2411.508429][T11796] kmem_cache_alloc+0x2be/0x710 [ 2411.513277][T11796] ? __alloc_file+0x93/0x480 [ 2411.517864][T11796] ? rcu_read_lock_sched_held+0x110/0x130 [ 2411.523579][T11796] ? kmem_cache_alloc+0x341/0x710 [ 2411.528604][T11796] security_file_alloc+0x39/0x170 [ 2411.533628][T11796] __alloc_file+0x128/0x480 [ 2411.538151][T11796] ? ____fput+0x20/0x20 [ 2411.542308][T11796] ? kasan_check_read+0x11/0x20 [ 2411.547158][T11796] ? do_raw_spin_unlock+0xa0/0x330 [ 2411.552267][T11796] ? do_raw_spin_trylock+0x270/0x270 [ 2411.557554][T11796] alloc_empty_file+0x72/0x170 [ 2411.562315][T11796] alloc_file+0x5e/0x4d0 [ 2411.566559][T11796] alloc_file_pseudo+0x24a/0x3b0 [ 2411.571580][T11796] ? alloc_file+0x4d0/0x4d0 [ 2411.576078][T11796] ? __check_object_size+0xa3/0x790 [ 2411.581283][T11796] __shmem_file_setup.part.0+0x108/0x2b0 [ 2411.586917][T11796] shmem_file_setup+0x66/0x90 [ 2411.591602][T11796] __x64_sys_memfd_create+0x2a2/0x4b0 [ 2411.596967][T11796] ? memfd_fcntl+0x1870/0x1870 [ 2411.601731][T11796] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2411.607197][T11796] do_syscall_64+0x1a3/0x800 [ 2411.611787][T11796] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2411.617412][T11796] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2411.623139][T11796] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2411.628692][T11796] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2411.634580][T11796] RIP: 0033:0x457ec9 [ 2411.638469][T11796] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 04:22:36 executing program 0: r0 = openat$vcs(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vcs\x00', 0x80, 0x0) ioctl$PPPIOCGNPMODE(r0, 0xc008744c, &(0x7f0000000080)={0xfb, 0x2}) ioctl$UI_ABS_SETUP(r0, 0x401c5504, &(0x7f0000000480)={0x1ff, {0x7fffffff, 0x8, 0x2, 0x52c1f1a1, 0x9, 0x6}}) getsockopt$inet6_tcp_buf(r0, 0x6, 0x3f, &(0x7f0000000300)=""/208, &(0x7f0000000040)=0xd0) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000100)=ANY=[@ANYBLOB='resize,resize,resize=0x0000000000000000,discard=0x0000000000000200,iocharset=macroman,resize=0x0000000000000400,fscontext=system_u,euid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) r1 = socket$xdp(0x2c, 0x3, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r1, 0x8919, &(0x7f0000000440)={'veth0\x00', {0x2, 0x4e20, @loopback}}) ioctl$TUNSETQUEUE(r0, 0x400454d9, &(0x7f0000000400)={'caif0\x00', 0x400}) 04:22:36 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x88a8ffff, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2411.658063][T11796] RSP: 002b:00007f18dfc72a88 EFLAGS: 00000246 ORIG_RAX: 000000000000013f [ 2411.666466][T11796] RAX: ffffffffffffffda RBX: 0000000020000680 RCX: 0000000000457ec9 [ 2411.674433][T11796] RDX: 0000000000000000 RSI: 0000000000000000 RDI: 00000000004bce80 [ 2411.682395][T11796] RBP: 000000000073bf00 R08: 0000000000000008 R09: 00000000fbad8001 [ 2411.690360][T11796] R10: 0000000020000680 R11: 0000000000000246 R12: 00007f18dfc736d4 [ 2411.698327][T11796] R13: 00000000004c669c R14: 00000000004db990 R15: 0000000000000004 [ 2411.706322][T11794] CPU: 0 PID: 11794 Comm: syz-executor3 Not tainted 5.0.0-rc2-next-20190115 #12 [ 2411.715436][T11794] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2411.725494][T11794] Call Trace: [ 2411.728879][T11794] dump_stack+0x1db/0x2d0 [ 2411.733211][T11794] ? dump_stack_print_info.cold+0x20/0x20 [ 2411.738932][T11794] ? do_sys_open+0x59a/0x7c0 [ 2411.743519][T11794] ? __x64_sys_open+0x7e/0xc0 [ 2411.748200][T11794] ? do_syscall_64+0x1a3/0x800 [ 2411.752966][T11794] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2411.759047][T11794] should_fail.cold+0xa/0x14 [ 2411.763647][T11794] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2411.769460][T11794] ? ___might_sleep+0x1e7/0x310 [ 2411.774316][T11794] ? arch_local_save_flags+0x50/0x50 [ 2411.779605][T11794] ? rcu_lockdep_current_cpu_online+0x1aa/0x220 [ 2411.785847][T11794] __should_failslab+0x121/0x190 [ 2411.790790][T11794] should_failslab+0x9/0x14 [ 2411.795295][T11794] kmem_cache_alloc+0x2be/0x710 [ 2411.800553][T11794] ? __alloc_file+0x93/0x480 [ 2411.805157][T11794] ? rcu_read_lock_sched_held+0x110/0x130 [ 2411.810875][T11794] ? kmem_cache_alloc+0x341/0x710 [ 2411.815903][T11794] security_file_alloc+0x39/0x170 [ 2411.820929][T11794] __alloc_file+0x128/0x480 [ 2411.825438][T11794] ? ____fput+0x20/0x20 [ 2411.829601][T11794] ? mark_held_locks+0x100/0x100 [ 2411.834555][T11794] alloc_empty_file+0x72/0x170 [ 2411.839319][T11794] path_openat+0x112/0x5660 [ 2411.843830][T11794] ? add_lock_to_list.isra.0+0x450/0x450 [ 2411.849469][T11794] ? __alloc_fd+0x549/0x700 [ 2411.853976][T11794] ? find_held_lock+0x35/0x120 [ 2411.858742][T11794] ? path_lookupat.isra.0+0xba0/0xba0 [ 2411.864120][T11794] ? do_dup2+0x580/0x580 [ 2411.868370][T11794] ? kasan_check_read+0x11/0x20 [ 2411.873223][T11794] ? do_raw_spin_unlock+0xa0/0x330 [ 2411.878334][T11794] ? do_raw_spin_trylock+0x270/0x270 [ 2411.883624][T11794] ? __phys_addr_symbol+0x30/0x70 [ 2411.888660][T11794] do_filp_open+0x26f/0x370 [ 2411.893162][T11794] ? may_open_dev+0x100/0x100 [ 2411.897837][T11794] ? exit_files+0xb0/0xb0 [ 2411.902167][T11794] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2411.908418][T11794] ? digsig_verify.cold+0x32/0x32 [ 2411.913448][T11794] ? get_unused_fd_flags+0x122/0x1a0 [ 2411.918739][T11794] ? __alloc_fd+0x700/0x700 [ 2411.923244][T11794] ? getname_flags+0x277/0x5b0 [ 2411.928013][T11794] do_sys_open+0x59a/0x7c0 [ 2411.932432][T11794] ? filp_open+0x80/0x80 [ 2411.936680][T11794] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2411.942750][T11794] ? trace_hardirqs_off_caller+0x300/0x300 [ 2411.948558][T11794] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2411.954020][T11794] __x64_sys_open+0x7e/0xc0 [ 2411.958527][T11794] do_syscall_64+0x1a3/0x800 [ 2411.963129][T11794] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2411.968977][T11794] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2411.974700][T11794] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2411.980259][T11794] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2411.986149][T11794] RIP: 0033:0x411e71 [ 2411.990044][T11794] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 04:22:37 executing program 1 (fault-call:3 fault-nth:5): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) [ 2412.009645][T11794] RSP: 002b:00007f7fc991fa80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 2412.018052][T11794] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 0000000000411e71 [ 2412.026202][T11794] RDX: 00007f7fc991fafa RSI: 0000000000000002 RDI: 00007f7fc991faf0 [ 2412.034177][T11794] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2412.042150][T11794] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 2412.050129][T11794] R13: 0000000000000000 R14: 00000000004db990 R15: 0000000000000003 04:22:37 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x800e0000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:37 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x4800, 0x0) 04:22:37 executing program 3 (fault-call:0 fault-nth:9): syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 04:22:37 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x80350000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) [ 2412.120518][T11802] FAULT_INJECTION: forcing a failure. [ 2412.120518][T11802] name failslab, interval 1, probability 0, space 0, times 0 [ 2412.147598][T11805] JFS: Cannot determine volume size [ 2412.164316][T11805] JFS: Cannot determine volume size [ 2412.186096][T11805] jfs: Unrecognized mount option "fscontext=system_u" or missing value [ 2412.194584][T11802] CPU: 1 PID: 11802 Comm: syz-executor1 Not tainted 5.0.0-rc2-next-20190115 #12 [ 2412.203620][T11802] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2412.213681][T11802] Call Trace: [ 2412.216993][T11802] dump_stack+0x1db/0x2d0 [ 2412.221341][T11802] ? dump_stack_print_info.cold+0x20/0x20 [ 2412.227079][T11802] ? inode_init_owner+0x340/0x340 [ 2412.232234][T11802] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2412.238576][T11802] should_fail.cold+0xa/0x14 [ 2412.243191][T11802] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2412.249102][T11802] ? ___might_sleep+0x1e7/0x310 [ 2412.253974][T11802] ? arch_local_save_flags+0x50/0x50 [ 2412.259270][T11802] ? evm_inode_post_setattr+0x47/0x70 [ 2412.264669][T11802] __should_failslab+0x121/0x190 [ 2412.269615][T11802] should_failslab+0x9/0x14 [ 2412.274124][T11802] kmem_cache_alloc+0x2be/0x710 [ 2412.278984][T11802] ? find_held_lock+0x35/0x120 [ 2412.283755][T11802] ? do_sys_ftruncate+0x41e/0x550 [ 2412.288788][T11802] getname_flags+0xd6/0x5b0 [ 2412.293295][T11802] getname+0x1a/0x20 [ 2412.297191][T11802] do_sys_open+0x3a5/0x7c0 [ 2412.301630][T11802] ? filp_open+0x80/0x80 [ 2412.305886][T11802] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2412.311962][T11802] ? trace_hardirqs_off_caller+0x300/0x300 [ 2412.317772][T11802] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2412.323243][T11802] __x64_sys_open+0x7e/0xc0 [ 2412.327753][T11802] do_syscall_64+0x1a3/0x800 [ 2412.332349][T11802] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2412.337983][T11802] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2412.343710][T11802] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2412.349270][T11802] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2412.355162][T11802] RIP: 0033:0x411e71 [ 2412.359062][T11802] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 2412.378672][T11802] RSP: 002b:00007f18dfc72a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 04:22:37 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x88caffff, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2412.387092][T11802] RAX: ffffffffffffffda RBX: 0000000020000690 RCX: 0000000000411e71 [ 2412.395064][T11802] RDX: 00007f18dfc72afa RSI: 0000000000000002 RDI: 00007f18dfc72af0 [ 2412.403041][T11802] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2412.411025][T11802] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 2412.419087][T11802] R13: 0000000000000000 R14: 00000000004db990 R15: 0000000000000004 04:22:38 executing program 1 (fault-call:3 fault-nth:6): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) [ 2412.483309][T11810] FAULT_INJECTION: forcing a failure. [ 2412.483309][T11810] name failslab, interval 1, probability 0, space 0, times 0 [ 2412.505468][T11816] JFS: Cannot determine volume size [ 2412.514534][T11816] JFS: Cannot determine volume size [ 2412.524602][T11810] CPU: 0 PID: 11810 Comm: syz-executor3 Not tainted 5.0.0-rc2-next-20190115 #12 [ 2412.533643][T11810] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2412.543703][T11810] Call Trace: [ 2412.547005][T11810] dump_stack+0x1db/0x2d0 [ 2412.551347][T11810] ? dump_stack_print_info.cold+0x20/0x20 [ 2412.557089][T11810] ? lock_downgrade+0xbe0/0xbe0 [ 2412.561953][T11810] should_fail.cold+0xa/0x14 [ 2412.566552][T11810] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2412.572374][T11810] ? ___might_sleep+0x1e7/0x310 [ 2412.577238][T11810] ? arch_local_save_flags+0x50/0x50 [ 2412.582540][T11810] __should_failslab+0x121/0x190 [ 2412.584718][T11821] FAULT_INJECTION: forcing a failure. [ 2412.584718][T11821] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2412.587492][T11810] should_failslab+0x9/0x14 [ 2412.605175][T11810] __kmalloc+0x2dc/0x740 [ 2412.609421][T11810] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2412.615652][T11810] ? fsnotify_first_mark+0x1bb/0x350 [ 2412.620925][T11810] ? inotify_handle_event+0x1ff/0x5c0 [ 2412.626291][T11810] inotify_handle_event+0x1ff/0x5c0 [ 2412.631485][T11810] fsnotify+0x901/0xef0 [ 2412.635647][T11810] ? fsnotify_first_mark+0x350/0x350 [ 2412.640935][T11810] ? rcu_read_unlock_special+0x380/0x380 [ 2412.646566][T11810] ? __might_sleep+0x95/0x190 [ 2412.651239][T11810] __fput+0x69e/0xb10 [ 2412.655234][T11810] ? file_free_rcu+0xe0/0xe0 [ 2412.659810][T11810] ? task_work_run+0x1bb/0x2b0 [ 2412.664564][T11810] ? trace_hardirqs_off_caller+0x300/0x300 [ 2412.670358][T11810] ? do_raw_spin_trylock+0x270/0x270 [ 2412.675634][T11810] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2412.681871][T11810] ____fput+0x16/0x20 [ 2412.685840][T11810] task_work_run+0x1f4/0x2b0 [ 2412.690432][T11810] ? task_work_cancel+0x2c0/0x2c0 [ 2412.695449][T11810] ? __close_fd+0x25f/0x3d0 [ 2412.699946][T11810] ? do_syscall_64+0x8c/0x800 [ 2412.704626][T11810] exit_to_usermode_loop+0x32a/0x3b0 [ 2412.709910][T11810] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2412.715966][T11810] ? syscall_trace_enter+0x12a0/0x12a0 [ 2412.721420][T11810] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2412.726892][T11810] do_syscall_64+0x696/0x800 [ 2412.731476][T11810] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2412.737103][T11810] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2412.742816][T11810] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2412.748359][T11810] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2412.754238][T11810] RIP: 0033:0x411c91 [ 2412.758128][T11810] Code: 75 14 b8 03 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 94 19 00 00 c3 48 83 ec 08 e8 0a fc ff ff 48 89 04 24 b8 03 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 53 fc ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 2412.777717][T11810] RSP: 002b:00007f7fc991fa80 EFLAGS: 00000293 ORIG_RAX: 0000000000000003 [ 2412.786114][T11810] RAX: 0000000000000000 RBX: 00007f7fc99206d4 RCX: 0000000000411c91 [ 2412.794075][T11810] RDX: 0000000000000004 RSI: 0000000000004c00 RDI: 0000000000000005 [ 2412.802043][T11810] RBP: 0000000000000005 R08: 0000000000000000 R09: 000000000000000a [ 2412.810004][T11810] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000004 [ 2412.817970][T11810] R13: 0000000000000000 R14: 00000000004db990 R15: 0000000000000003 [ 2412.825952][T11821] CPU: 1 PID: 11821 Comm: syz-executor1 Not tainted 5.0.0-rc2-next-20190115 #12 [ 2412.834962][T11821] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2412.834969][T11821] Call Trace: [ 2412.834990][T11821] dump_stack+0x1db/0x2d0 [ 2412.835010][T11821] ? dump_stack_print_info.cold+0x20/0x20 [ 2412.845662][T11816] jfs: Unrecognized mount option "fscontext=system_u" or missing value [ 2412.848338][T11821] ? mark_held_locks+0xb1/0x100 [ 2412.848362][T11821] should_fail.cold+0xa/0x14 [ 2412.848383][T11821] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2412.858396][T11821] ? trace_hardirqs_off_caller+0x300/0x300 [ 2412.858423][T11821] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2412.858437][T11821] ? ktime_get_coarse_real_ts64+0x24c/0x3b0 [ 2412.858455][T11821] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2412.871499][T11821] ? timespec64_trunc+0xf0/0x180 [ 2412.871522][T11821] should_fail_alloc_page+0x50/0x60 [ 2412.871539][T11821] __alloc_pages_nodemask+0x323/0xdc0 [ 2412.871551][T11821] ? inode_init_owner+0x340/0x340 [ 2412.871571][T11821] ? __alloc_pages_slowpath+0x2c60/0x2c60 [ 2412.881919][T11821] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2412.881952][T11821] ? ___might_sleep+0x1e7/0x310 [ 2412.881970][T11821] ? trace_hardirqs_off+0xb8/0x310 [ 2412.881992][T11821] cache_grow_begin+0x9c/0x8c0 [ 2412.952660][T11821] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2412.958912][T11821] ? check_preemption_disabled+0x48/0x290 [ 2412.964637][T11821] kmem_cache_alloc+0x645/0x710 [ 2412.969484][T11821] ? find_held_lock+0x35/0x120 [ 2412.974252][T11821] ? do_sys_ftruncate+0x41e/0x550 [ 2412.979284][T11821] getname_flags+0xd6/0x5b0 [ 2412.983788][T11821] getname+0x1a/0x20 [ 2412.987683][T11821] do_sys_open+0x3a5/0x7c0 [ 2412.992104][T11821] ? filp_open+0x80/0x80 [ 2412.996356][T11821] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2413.002434][T11821] ? trace_hardirqs_off_caller+0x300/0x300 [ 2413.008262][T11821] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2413.013722][T11821] __x64_sys_open+0x7e/0xc0 [ 2413.018228][T11821] do_syscall_64+0x1a3/0x800 [ 2413.022823][T11821] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2413.028460][T11821] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2413.034190][T11821] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2413.039743][T11821] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2413.045633][T11821] RIP: 0033:0x411e71 [ 2413.049528][T11821] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 2413.069127][T11821] RSP: 002b:00007f18dfc72a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 2413.077537][T11821] RAX: ffffffffffffffda RBX: 0000000020000690 RCX: 0000000000411e71 04:22:38 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x89060000, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:38 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x81000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) [ 2413.085510][T11821] RDX: 00007f18dfc72afa RSI: 0000000000000002 RDI: 00007f18dfc72af0 [ 2413.093497][T11821] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2413.101465][T11821] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 2413.109433][T11821] R13: 0000000000000000 R14: 00000000004db990 R15: 0000000000000004 04:22:38 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x4c00, 0x0) 04:22:38 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0xffffa888, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:38 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x86ddffff}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:38 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0xffffca88, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:38 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x88470000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:38 executing program 1 (fault-call:3 fault-nth:7): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) 04:22:39 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 04:22:39 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0xffffdd86, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:39 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x88480000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:39 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000001700)={[{@resize='resize'}, {@resize='resize'}, {@resize_size={'resize'}}, {@discard_size={'discard', 0x3d, 0x200}}, {@iocharset={'iocharset', 0x3d, 'macroman'}}, {@resize_size={'resize', 0x3d, 0x400}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@euid_eq={'euid'}}]}) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000300)={0x0, 0x0, 0x0}, &(0x7f0000000340)=0xc) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x33e, 0x3, &(0x7f0000000280)=[{&(0x7f0000000100)="58dbd0a94802a2b500cb0dd5ce00be74b77ca5a3cfbcf9d24a5897f28673208e081f85381d9360b04bb71eed6cb1caf7400032311572d553dd328ef27c47c6fdbfa032dd4d47b9ccc9a346f0881b425a947b243ca1d983193beaa0d181837ff31014fa5103572f52874cbdc53099a6b9c236f7ab89c3e21738fffeef966da334be686c919046702e", 0x88, 0x1ff}, {&(0x7f00000001c0)="a3ba04c3", 0x4, 0x1}, {&(0x7f0000000200)="b4c8cbed47f13a4a5199875e0a43b3c55a0c045d0888739de4271a8332c8c89c6faed6aeca06570aabdd9adf38aef2030b836026feeaa3375846f1cb7fb1f0e0d7152fb1b71a346cfd1e50dca9d03ed9c1fe727db30f985b0074346e7d86864c20e695526167c2b0a4fcc64dfe1e725769210281b6ebf8", 0x77, 0x7fff}], 0x100000, &(0x7f0000000380)={[{@errors_continue='errors=continue'}, {@umask={'umask', 0x3d, 0x8}}, {@gid={'gid', 0x3d, r0}}, {@iocharset={'iocharset', 0x3d, 'macceltic'}}, {@nointegrity='nointegrity'}, {@resize='resize'}, {@resize_size={'resize', 0x3d, 0x23bc}}, {@errors_remount='errors=remount-ro'}, {@discard_size={'discard', 0x3d, 0x800}}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'iocharset'}}]}) 04:22:39 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x6800, 0x0) [ 2413.576306][T11846] JFS: Cannot determine volume size 04:22:39 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x88640000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:39 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0xfffff000, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2413.598099][T11850] FAULT_INJECTION: forcing a failure. [ 2413.598099][T11850] name failslab, interval 1, probability 0, space 0, times 0 [ 2413.600641][T11846] JFS: Cannot determine volume size [ 2413.635161][T11846] jfs: Unrecognized mount option "fscontext=system_u" or missing value [ 2413.654066][T11850] CPU: 1 PID: 11850 Comm: syz-executor1 Not tainted 5.0.0-rc2-next-20190115 #12 [ 2413.663127][T11850] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2413.673186][T11850] Call Trace: [ 2413.676489][T11850] dump_stack+0x1db/0x2d0 [ 2413.680829][T11850] ? dump_stack_print_info.cold+0x20/0x20 [ 2413.686576][T11850] should_fail.cold+0xa/0x14 [ 2413.691181][T11850] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2413.697008][T11850] ? ___might_sleep+0x1e7/0x310 [ 2413.701865][T11850] ? arch_local_save_flags+0x50/0x50 [ 2413.707155][T11850] ? mark_held_locks+0x100/0x100 [ 2413.712096][T11850] ? print_usage_bug+0xd0/0xd0 [ 2413.716875][T11850] __should_failslab+0x121/0x190 [ 2413.721822][T11850] should_failslab+0x9/0x14 [ 2413.726345][T11850] kmem_cache_alloc+0x2be/0x710 [ 2413.731199][T11850] ? __lock_acquire+0x572/0x4a10 [ 2413.736137][T11850] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2413.742385][T11850] __alloc_file+0x93/0x480 [ 2413.746811][T11850] ? ____fput+0x20/0x20 [ 2413.750997][T11850] ? mark_held_locks+0x100/0x100 [ 2413.755952][T11850] alloc_empty_file+0x72/0x170 [ 2413.760727][T11850] path_openat+0x112/0x5660 [ 2413.765234][T11850] ? add_lock_to_list.isra.0+0x450/0x450 [ 2413.770877][T11850] ? __alloc_fd+0x549/0x700 [ 2413.775382][T11850] ? find_held_lock+0x35/0x120 [ 2413.780149][T11850] ? path_lookupat.isra.0+0xba0/0xba0 [ 2413.785530][T11850] ? do_dup2+0x580/0x580 [ 2413.789793][T11850] ? kasan_check_read+0x11/0x20 [ 2413.794658][T11850] ? do_raw_spin_unlock+0xa0/0x330 [ 2413.799781][T11850] ? do_raw_spin_trylock+0x270/0x270 [ 2413.805347][T11850] ? __phys_addr_symbol+0x30/0x70 [ 2413.810389][T11850] do_filp_open+0x26f/0x370 [ 2413.814896][T11850] ? may_open_dev+0x100/0x100 [ 2413.819598][T11850] ? exit_files+0xb0/0xb0 [ 2413.823942][T11850] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2413.830223][T11850] ? digsig_verify.cold+0x32/0x32 [ 2413.835392][T11850] ? get_unused_fd_flags+0x122/0x1a0 [ 2413.840681][T11850] ? __alloc_fd+0x700/0x700 [ 2413.845189][T11850] ? getname_flags+0x277/0x5b0 [ 2413.849968][T11850] do_sys_open+0x59a/0x7c0 [ 2413.854393][T11850] ? filp_open+0x80/0x80 [ 2413.858648][T11850] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2413.864715][T11850] ? trace_hardirqs_off_caller+0x300/0x300 [ 2413.870525][T11850] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2413.875994][T11850] __x64_sys_open+0x7e/0xc0 [ 2413.880503][T11850] do_syscall_64+0x1a3/0x800 [ 2413.885100][T11850] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2413.890742][T11850] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2413.896486][T11850] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2413.902048][T11850] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2413.907948][T11850] RIP: 0033:0x411e71 [ 2413.911857][T11850] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 2413.931480][T11850] RSP: 002b:00007f18dfc72a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 2413.939894][T11850] RAX: ffffffffffffffda RBX: 0000000020000690 RCX: 0000000000411e71 [ 2413.947866][T11850] RDX: 00007f18dfc72afa RSI: 0000000000000002 RDI: 00007f18dfc72af0 [ 2413.955843][T11850] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2413.963825][T11850] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 2413.972322][T11850] R13: 0000000000000000 R14: 00000000004db990 R15: 0000000000000004 04:22:39 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0xf0ffffffffffff, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:39 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x6c00, 0x0) 04:22:39 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x02', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 04:22:39 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x88a8ffff}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) [ 2414.122656][T11846] JFS: Cannot determine volume size [ 2414.144268][T11846] JFS: Cannot determine volume size [ 2414.150186][T11846] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:22:39 executing program 1 (fault-call:3 fault-nth:8): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) 04:22:39 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x100000000000000, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:39 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x88caffff}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:39 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x03', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 2414.275547][T11873] FAULT_INJECTION: forcing a failure. [ 2414.275547][T11873] name failslab, interval 1, probability 0, space 0, times 0 04:22:39 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x7400, 0x0) [ 2414.329150][T11873] CPU: 0 PID: 11873 Comm: syz-executor1 Not tainted 5.0.0-rc2-next-20190115 #12 [ 2414.338213][T11873] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2414.348275][T11873] Call Trace: [ 2414.351590][T11873] dump_stack+0x1db/0x2d0 [ 2414.355950][T11873] ? dump_stack_print_info.cold+0x20/0x20 [ 2414.361708][T11873] should_fail.cold+0xa/0x14 [ 2414.366315][T11873] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2414.372133][T11873] ? ___might_sleep+0x1e7/0x310 04:22:39 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x200000000000000, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:39 executing program 0: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000100)={[{@resize='resize'}, {@resize='resize'}, {@resize_size={'resize'}}, {@discard_size={'discard', 0x3d, 0x200}}, {@noquota='noquota'}, {@resize_size={'resize', 0x3d, 0x400}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@euid_eq={'euid'}}]}) 04:22:39 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x04', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 2414.376986][T11873] ? arch_local_save_flags+0x50/0x50 [ 2414.382284][T11873] ? rcu_lockdep_current_cpu_online+0x1aa/0x220 [ 2414.388546][T11873] __should_failslab+0x121/0x190 [ 2414.393494][T11873] should_failslab+0x9/0x14 [ 2414.398004][T11873] kmem_cache_alloc+0x2be/0x710 [ 2414.402863][T11873] ? __alloc_file+0x93/0x480 [ 2414.407462][T11873] ? rcu_read_lock_sched_held+0x110/0x130 [ 2414.413302][T11873] ? kmem_cache_alloc+0x341/0x710 [ 2414.418338][T11873] security_file_alloc+0x39/0x170 [ 2414.423377][T11873] __alloc_file+0x128/0x480 04:22:40 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x89060000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) [ 2414.427887][T11873] ? ____fput+0x20/0x20 [ 2414.432062][T11873] ? mark_held_locks+0x100/0x100 [ 2414.437018][T11873] alloc_empty_file+0x72/0x170 [ 2414.441788][T11873] path_openat+0x112/0x5660 [ 2414.446300][T11873] ? add_lock_to_list.isra.0+0x450/0x450 [ 2414.451959][T11873] ? __alloc_fd+0x549/0x700 [ 2414.456466][T11873] ? find_held_lock+0x35/0x120 [ 2414.461228][T11873] ? path_lookupat.isra.0+0xba0/0xba0 [ 2414.466609][T11873] ? do_dup2+0x580/0x580 [ 2414.470863][T11873] ? kasan_check_read+0x11/0x20 [ 2414.475721][T11873] ? do_raw_spin_unlock+0xa0/0x330 [ 2414.480839][T11873] ? do_raw_spin_trylock+0x270/0x270 [ 2414.486126][T11873] ? __phys_addr_symbol+0x30/0x70 [ 2414.491165][T11873] do_filp_open+0x26f/0x370 [ 2414.495667][T11873] ? may_open_dev+0x100/0x100 [ 2414.500357][T11873] ? exit_files+0xb0/0xb0 [ 2414.504689][T11873] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2414.510944][T11873] ? digsig_verify.cold+0x32/0x32 [ 2414.515978][T11873] ? get_unused_fd_flags+0x122/0x1a0 [ 2414.521266][T11873] ? __alloc_fd+0x700/0x700 [ 2414.525769][T11873] ? getname_flags+0x277/0x5b0 [ 2414.530542][T11873] do_sys_open+0x59a/0x7c0 [ 2414.534963][T11873] ? filp_open+0x80/0x80 [ 2414.539214][T11873] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2414.545301][T11873] ? trace_hardirqs_off_caller+0x300/0x300 [ 2414.551110][T11873] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2414.556570][T11873] __x64_sys_open+0x7e/0xc0 [ 2414.561093][T11873] do_syscall_64+0x1a3/0x800 [ 2414.565690][T11873] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2414.571341][T11873] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2414.577066][T11873] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2414.582626][T11873] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2414.588519][T11873] RIP: 0033:0x411e71 [ 2414.592413][T11873] Code: 75 14 b8 02 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 b4 17 00 00 c3 48 83 ec 08 e8 2a fa ff ff 48 89 04 24 b8 02 00 00 00 0f 05 <48> 8b 3c 24 48 89 c2 e8 73 fa ff ff 48 89 d0 48 83 c4 08 48 3d 01 [ 2414.612033][T11873] RSP: 002b:00007f18dfc72a80 EFLAGS: 00000293 ORIG_RAX: 0000000000000002 [ 2414.620446][T11873] RAX: ffffffffffffffda RBX: 0000000020000690 RCX: 0000000000411e71 04:22:40 executing program 1 (fault-call:3 fault-nth:9): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) [ 2414.628419][T11873] RDX: 00007f18dfc72afa RSI: 0000000000000002 RDI: 00007f18dfc72af0 [ 2414.636392][T11873] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2414.644369][T11873] R10: 0000000000000075 R11: 0000000000000293 R12: 0000000000000005 [ 2414.652338][T11873] R13: 0000000000000000 R14: 00000000004db990 R15: 0000000000000004 [ 2414.730116][T11880] JFS: Cannot determine volume size [ 2414.759681][T11880] JFS: Cannot determine volume size 04:22:40 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0xfeffffff}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:40 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\b', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 04:22:40 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x300000000000000, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2414.780235][T11880] jfs: Unrecognized mount option "fscontext=system_u" or missing value [ 2414.850318][T11892] FAULT_INJECTION: forcing a failure. [ 2414.850318][T11892] name failslab, interval 1, probability 0, space 0, times 0 [ 2414.869550][T11892] CPU: 1 PID: 11892 Comm: syz-executor1 Not tainted 5.0.0-rc2-next-20190115 #12 [ 2414.878587][T11892] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2414.888638][T11892] Call Trace: [ 2414.891936][T11892] dump_stack+0x1db/0x2d0 [ 2414.896269][T11892] ? dump_stack_print_info.cold+0x20/0x20 [ 2414.902003][T11892] should_fail.cold+0xa/0x14 [ 2414.906599][T11892] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2414.912416][T11892] ? ___might_sleep+0x1e7/0x310 [ 2414.917266][T11892] ? arch_local_save_flags+0x50/0x50 [ 2414.922559][T11892] __should_failslab+0x121/0x190 [ 2414.927499][T11892] should_failslab+0x9/0x14 [ 2414.932004][T11892] kmem_cache_alloc_trace+0x2d1/0x760 [ 2414.937377][T11892] ? __mutex_lock+0x622/0x1670 [ 2414.942133][T11892] ? find_held_lock+0x35/0x120 [ 2414.946899][T11892] ? lo_ioctl+0x25b/0x23e0 [ 2414.951317][T11892] ? __fget+0x473/0x710 [ 2414.955469][T11892] ? loop_get_status64+0x150/0x150 [ 2414.960583][T11892] __kthread_create_on_node+0x122/0x530 [ 2414.966127][T11892] ? kthread_parkme+0xb0/0xb0 [ 2414.970806][T11892] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2414.976787][T11892] ? rcu_read_unlock_special+0x380/0x380 [ 2414.982437][T11892] ? loop_get_status64+0x150/0x150 [ 2414.987563][T11892] kthread_create_on_node+0xbb/0xf0 [ 2414.992763][T11892] ? __kthread_create_on_node+0x530/0x530 [ 2414.998478][T11892] ? kthread_park+0x1b0/0x1b0 [ 2415.003156][T11892] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2415.009394][T11892] lo_ioctl+0xc80/0x23e0 [ 2415.013638][T11892] ? lo_rw_aio+0x1e50/0x1e50 [ 2415.018228][T11892] ? __fget+0x473/0x710 [ 2415.022381][T11892] ? lo_rw_aio+0x1e50/0x1e50 [ 2415.026974][T11892] blkdev_ioctl+0x10e0/0x2120 [ 2415.031649][T11892] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2415.037888][T11892] ? blkpg_ioctl+0xc10/0xc10 [ 2415.042478][T11892] ? lock_downgrade+0xbe0/0xbe0 [ 2415.047322][T11892] ? kasan_check_read+0x11/0x20 [ 2415.052174][T11892] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2415.058167][T11892] ? rcu_read_unlock_special+0x380/0x380 [ 2415.063805][T11892] ? __fget+0x49a/0x710 [ 2415.067968][T11892] block_ioctl+0xee/0x130 [ 2415.072296][T11892] ? blkdev_fallocate+0x410/0x410 [ 2415.077321][T11892] do_vfs_ioctl+0x107b/0x17d0 [ 2415.082003][T11892] ? putname+0xef/0x130 [ 2415.086156][T11892] ? ioctl_preallocate+0x2f0/0x2f0 [ 2415.091270][T11892] ? __fget_light+0x2db/0x420 [ 2415.095944][T11892] ? fget_raw+0x20/0x20 [ 2415.100103][T11892] ? do_sys_open+0x3f9/0x7c0 [ 2415.104691][T11892] ? do_syscall_64+0x8c/0x800 [ 2415.109370][T11892] ? do_syscall_64+0x8c/0x800 [ 2415.114042][T11892] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2415.119330][T11892] ? security_file_ioctl+0x93/0xc0 [ 2415.124441][T11892] ksys_ioctl+0xab/0xd0 [ 2415.128600][T11892] __x64_sys_ioctl+0x73/0xb0 [ 2415.133191][T11892] do_syscall_64+0x1a3/0x800 [ 2415.137781][T11892] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2415.143413][T11892] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2415.149135][T11892] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2415.154691][T11892] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2415.160784][T11892] RIP: 0033:0x457d37 [ 2415.164680][T11892] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 cd b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2415.184277][T11892] RSP: 002b:00007f18dfc72a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2415.192684][T11892] RAX: ffffffffffffffda RBX: 0000000020000690 RCX: 0000000000457d37 [ 2415.200656][T11892] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 2415.208622][T11892] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2415.216589][T11892] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 2415.224557][T11892] R13: 0000000000000000 R14: 00000000004db990 R15: 0000000000000004 04:22:40 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0xffffa888}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:40 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x600000000000000, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:40 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000001700)={[{@resize='resize'}, {@resize='resize'}, {@resize_size={'resize'}}, {@discard_size={'discard', 0x3d, 0x200}}, {@iocharset={'iocharset', 0x3d, 'macroman'}}, {@resize_size={'resize', 0x3d, 0x400}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@euid_eq={'euid'}}]}) r0 = timerfd_create(0x2, 0x80800) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r0, 0x660c) 04:22:40 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x7a00, 0x0) 04:22:40 executing program 1 (fault-call:3 fault-nth:10): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) 04:22:40 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 04:22:41 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0xffffca88}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) [ 2415.432002][T11904] JFS: Cannot determine volume size [ 2415.450314][T11904] JFS: Cannot determine volume size 04:22:41 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x700000000000000, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2415.484439][T11904] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:22:41 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 04:22:41 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0xffffdd86}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) [ 2415.599312][T11916] FAULT_INJECTION: forcing a failure. [ 2415.599312][T11916] name failslab, interval 1, probability 0, space 0, times 0 [ 2415.621490][T11916] CPU: 1 PID: 11916 Comm: syz-executor1 Not tainted 5.0.0-rc2-next-20190115 #12 [ 2415.630545][T11916] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2415.640604][T11916] Call Trace: [ 2415.643907][T11916] dump_stack+0x1db/0x2d0 [ 2415.648248][T11916] ? dump_stack_print_info.cold+0x20/0x20 [ 2415.653983][T11916] should_fail.cold+0xa/0x14 [ 2415.658576][T11916] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2415.664392][T11916] ? ___might_sleep+0x1e7/0x310 [ 2415.669257][T11916] ? arch_local_save_flags+0x50/0x50 [ 2415.674550][T11916] ? enqueue_entity+0x321/0x20b0 [ 2415.679494][T11916] __should_failslab+0x121/0x190 [ 2415.684433][T11916] should_failslab+0x9/0x14 [ 2415.688937][T11916] kmem_cache_alloc+0x2be/0x710 [ 2415.693794][T11916] ? reweight_task+0x130/0x130 [ 2415.698571][T11916] __kernfs_new_node+0xfe/0x8a0 [ 2415.703426][T11916] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 2415.708886][T11916] ? add_lock_to_list.isra.0+0x450/0x450 [ 2415.714519][T11916] ? add_lock_to_list.isra.0+0x450/0x450 [ 2415.720152][T11916] ? print_usage_bug+0xd0/0xd0 [ 2415.724929][T11916] ? bd_set_size+0x2c1/0x370 [ 2415.729519][T11916] ? find_held_lock+0x35/0x120 [ 2415.734285][T11916] ? bd_set_size+0x2c1/0x370 [ 2415.738878][T11916] kernfs_new_node+0x99/0x130 [ 2415.743559][T11916] kernfs_create_dir_ns+0x52/0x160 [ 2415.748682][T11916] internal_create_group+0x8cd/0xd80 [ 2415.753976][T11916] ? remove_files.isra.0+0x190/0x190 [ 2415.759262][T11916] ? down_read+0x120/0x120 [ 2415.763692][T11916] ? resched_curr+0x1a0/0x1a0 [ 2415.768379][T11916] sysfs_create_group+0x20/0x30 [ 2415.773238][T11916] lo_ioctl+0x1147/0x23e0 [ 2415.777577][T11916] ? lo_rw_aio+0x1e50/0x1e50 [ 2415.782194][T11916] ? __fget+0x473/0x710 [ 2415.786351][T11916] ? lo_rw_aio+0x1e50/0x1e50 [ 2415.790942][T11916] blkdev_ioctl+0x10e0/0x2120 [ 2415.795618][T11916] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2415.802196][T11916] ? blkpg_ioctl+0xc10/0xc10 [ 2415.806788][T11916] ? lock_downgrade+0xbe0/0xbe0 [ 2415.811642][T11916] ? kasan_check_read+0x11/0x20 [ 2415.816497][T11916] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2415.822476][T11916] ? rcu_read_unlock_special+0x380/0x380 [ 2415.828125][T11916] ? __fget+0x49a/0x710 [ 2415.832289][T11916] block_ioctl+0xee/0x130 [ 2415.836617][T11916] ? blkdev_fallocate+0x410/0x410 [ 2415.841643][T11916] do_vfs_ioctl+0x107b/0x17d0 [ 2415.846322][T11916] ? putname+0xef/0x130 [ 2415.850480][T11916] ? ioctl_preallocate+0x2f0/0x2f0 [ 2415.855594][T11916] ? __fget_light+0x2db/0x420 [ 2415.860269][T11916] ? fget_raw+0x20/0x20 [ 2415.864423][T11916] ? do_sys_open+0x3f9/0x7c0 [ 2415.869012][T11916] ? do_syscall_64+0x8c/0x800 [ 2415.873692][T11916] ? do_syscall_64+0x8c/0x800 [ 2415.878365][T11916] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2415.883654][T11916] ? security_file_ioctl+0x93/0xc0 [ 2415.888773][T11916] ksys_ioctl+0xab/0xd0 [ 2415.892941][T11916] __x64_sys_ioctl+0x73/0xb0 [ 2415.897535][T11916] do_syscall_64+0x1a3/0x800 [ 2415.902129][T11916] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2415.907761][T11916] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2415.913492][T11916] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2415.919043][T11916] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2415.924929][T11916] RIP: 0033:0x457d37 [ 2415.928833][T11916] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 cd b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 04:22:41 executing program 0: pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) bpf$BPF_GET_PROG_INFO(0xf, &(0x7f0000000080)={r1, 0x50, &(0x7f00000001c0)}, 0x10) ioctl$KVM_GET_ONE_REG(r1, 0x4010aeab, &(0x7f0000000040)={0x8, 0x7}) r2 = bpf$PROG_LOAD(0x5, &(0x7f00000002c0)={0x14, 0x3, &(0x7f0000000240)=ANY=[@ANYBLOB="18100000", @ANYRES32=r0, @ANYBLOB="00010000000000003e0121f95e44b8c0"], &(0x7f0000000280)='syzkaller\x00', 0x6, 0x0, 0x0, 0x40fff, 0x1, [], 0x0, 0xc}, 0x48) ftruncate(r2, 0x2) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000400)=ANY=[@ANYBLOB="726573697a652c726573697a652c7b6573780f00003078303030303030303030303030303030302c646973636172643d3078303030303030303230302c6e6f646973636172642c696f636861727365743d63713836302c6673636f6e74653a3c6ba41d924478743d73797374656d5f752c657569643d000000000000", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) prctl$PR_SET_MM_MAP_SIZE(0x23, 0xf, &(0x7f0000000340)) 04:22:41 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x800000000000000, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2415.948430][T11916] RSP: 002b:00007f18dfc72a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2415.956836][T11916] RAX: ffffffffffffffda RBX: 0000000020000690 RCX: 0000000000457d37 [ 2415.964808][T11916] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 2415.973282][T11916] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2415.981250][T11916] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 2415.989216][T11916] R13: 0000000000000000 R14: 00000000004db990 R15: 0000000000000004 04:22:41 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0xfffff000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:41 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x806000000000000, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:41 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xedc0, 0x0) [ 2416.149465][T11927] JFS: Cannot determine volume size 04:22:41 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 04:22:41 executing program 1 (fault-call:3 fault-nth:11): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) [ 2416.192573][T11927] JFS: Cannot determine volume size 04:22:41 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0xd00000000000000, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2416.219029][T11927] jfs: Unrecognized mount option "{esx" or missing value 04:22:41 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0xfffffffe}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:41 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x1000000000000000, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2416.339416][T11943] FAULT_INJECTION: forcing a failure. [ 2416.339416][T11943] name failslab, interval 1, probability 0, space 0, times 0 [ 2416.352298][T11943] CPU: 1 PID: 11943 Comm: syz-executor1 Not tainted 5.0.0-rc2-next-20190115 #12 [ 2416.361315][T11943] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2416.371362][T11943] Call Trace: [ 2416.374662][T11943] dump_stack+0x1db/0x2d0 [ 2416.378998][T11943] ? dump_stack_print_info.cold+0x20/0x20 [ 2416.384730][T11943] should_fail.cold+0xa/0x14 [ 2416.389329][T11943] ? __lock_acquire+0x572/0x4a10 [ 2416.394267][T11943] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2416.400072][T11943] ? find_held_lock+0x35/0x120 [ 2416.404850][T11943] ? is_bpf_text_address+0xac/0x170 [ 2416.410053][T11943] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2416.416302][T11943] __should_failslab+0x121/0x190 [ 2416.421243][T11943] should_failslab+0x9/0x14 [ 2416.425742][T11943] kmem_cache_alloc+0x47/0x710 [ 2416.430508][T11943] ? print_usage_bug+0xd0/0xd0 [ 2416.435278][T11943] radix_tree_node_alloc.constprop.0+0x1eb/0x340 [ 2416.441610][T11943] idr_get_free+0x72c/0xee0 [ 2416.446112][T11943] ? __save_stack_trace+0x8a/0xf0 [ 2416.451145][T11943] ? radix_tree_iter_tag_clear+0x90/0x90 [ 2416.456781][T11943] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2416.462586][T11943] ? kasan_slab_alloc+0xf/0x20 [ 2416.467347][T11943] ? kmem_cache_alloc+0x12d/0x710 [ 2416.472370][T11943] ? kernfs_new_node+0x99/0x130 [ 2416.477218][T11943] ? kernfs_create_dir_ns+0x52/0x160 [ 2416.482500][T11943] ? internal_create_group+0x8cd/0xd80 [ 2416.487962][T11943] ? sysfs_create_group+0x20/0x30 [ 2416.492980][T11943] ? lo_ioctl+0x1147/0x23e0 [ 2416.497477][T11943] ? blkdev_ioctl+0x10e0/0x2120 [ 2416.502322][T11943] ? block_ioctl+0xee/0x130 [ 2416.506824][T11943] ? do_vfs_ioctl+0x107b/0x17d0 [ 2416.511671][T11943] ? ksys_ioctl+0xab/0xd0 [ 2416.515996][T11943] ? __x64_sys_ioctl+0x73/0xb0 [ 2416.520767][T11943] ? do_syscall_64+0x1a3/0x800 [ 2416.525534][T11943] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2416.531599][T11943] ? print_usage_bug+0xd0/0xd0 [ 2416.536378][T11943] idr_alloc_u32+0x1d8/0x3a0 [ 2416.540975][T11943] ? __fprop_inc_percpu_max+0x2d0/0x2d0 [ 2416.546536][T11943] ? lock_acquire+0x1db/0x570 [ 2416.551215][T11943] ? __kernfs_new_node+0x125/0x8a0 [ 2416.556328][T11943] idr_alloc_cyclic+0x153/0x330 [ 2416.561180][T11943] ? idr_alloc+0x1b0/0x1b0 [ 2416.565603][T11943] __kernfs_new_node+0x1c1/0x8a0 [ 2416.570544][T11943] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 2416.576001][T11943] ? add_lock_to_list.isra.0+0x450/0x450 [ 2416.581636][T11943] ? add_lock_to_list.isra.0+0x450/0x450 [ 2416.587265][T11943] ? print_usage_bug+0xd0/0xd0 [ 2416.592047][T11943] ? bd_set_size+0x2c1/0x370 [ 2416.596635][T11943] ? find_held_lock+0x35/0x120 [ 2416.601394][T11943] ? bd_set_size+0x2c1/0x370 [ 2416.605990][T11943] kernfs_new_node+0x99/0x130 [ 2416.610668][T11943] kernfs_create_dir_ns+0x52/0x160 [ 2416.615787][T11943] internal_create_group+0x8cd/0xd80 [ 2416.621078][T11943] ? remove_files.isra.0+0x190/0x190 [ 2416.626362][T11943] ? down_read+0x120/0x120 [ 2416.630785][T11943] ? resched_curr+0x1a0/0x1a0 [ 2416.635468][T11943] sysfs_create_group+0x20/0x30 [ 2416.640317][T11943] lo_ioctl+0x1147/0x23e0 [ 2416.644653][T11943] ? lo_rw_aio+0x1e50/0x1e50 [ 2416.649243][T11943] ? __fget+0x473/0x710 [ 2416.653395][T11943] ? lo_rw_aio+0x1e50/0x1e50 [ 2416.657997][T11943] blkdev_ioctl+0x10e0/0x2120 [ 2416.662675][T11943] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2416.668909][T11943] ? blkpg_ioctl+0xc10/0xc10 [ 2416.673496][T11943] ? lock_downgrade+0xbe0/0xbe0 [ 2416.678342][T11943] ? kasan_check_read+0x11/0x20 [ 2416.683189][T11943] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2416.689167][T11943] ? rcu_read_unlock_special+0x380/0x380 [ 2416.694809][T11943] ? __fget+0x49a/0x710 [ 2416.698971][T11943] block_ioctl+0xee/0x130 [ 2416.703302][T11943] ? blkdev_fallocate+0x410/0x410 [ 2416.708322][T11943] do_vfs_ioctl+0x107b/0x17d0 [ 2416.712997][T11943] ? putname+0xef/0x130 [ 2416.717155][T11943] ? ioctl_preallocate+0x2f0/0x2f0 [ 2416.722264][T11943] ? __fget_light+0x2db/0x420 [ 2416.726941][T11943] ? fget_raw+0x20/0x20 [ 2416.731095][T11943] ? do_sys_open+0x3f9/0x7c0 [ 2416.735680][T11943] ? do_syscall_64+0x8c/0x800 [ 2416.740353][T11943] ? do_syscall_64+0x8c/0x800 [ 2416.745029][T11943] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2416.750313][T11943] ? security_file_ioctl+0x93/0xc0 [ 2416.755421][T11943] ksys_ioctl+0xab/0xd0 [ 2416.759581][T11943] __x64_sys_ioctl+0x73/0xb0 [ 2416.764172][T11943] do_syscall_64+0x1a3/0x800 [ 2416.768768][T11943] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2416.774399][T11943] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2416.780119][T11943] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2416.785670][T11943] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2416.791556][T11943] RIP: 0033:0x457d37 [ 2416.795451][T11943] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 cd b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2416.815052][T11943] RSP: 002b:00007f18dfc72a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2416.823459][T11943] RAX: ffffffffffffffda RBX: 0000000020000690 RCX: 0000000000457d37 [ 2416.831424][T11943] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 2416.839389][T11943] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2416.847351][T11943] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 2416.855317][T11943] R13: 0000000000000000 R14: 00000000004db990 R15: 0000000000000004 04:22:42 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000001700)={[{@resize='resize'}, {@resize='resize'}, {@resize_size={'resize'}}, {@discard_size={'discard', 0x3d, 0x200}}, {@iocharset={'iocharset', 0x3d, 'macroman'}}, {@resize_size={'resize', 0x3d, 0x400}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@euid_eq={'euid'}}]}) lstat(&(0x7f0000000500)='./file0\x00', &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f00000007c0)='/dev/dlm_plock\x00', 0x2, 0x0) ioctl$SIOCRSSL2CALL(r1, 0x89e2, &(0x7f0000000800)=@null) syz_mount_image$ext4(&(0x7f0000000040)='ext2\x00', &(0x7f0000000080)='./file0\x00', 0x8, 0x5, &(0x7f0000000480)=[{&(0x7f0000000100)="1989f2f147bc7803f07a5bf66ba0ebf98332f83078dfe66ff7acea4ad5a3b280002b1ba2f668d86e2fcd5053c3f1c5053428ca12fcb51fd4fb85f14c59dd90fdcf478b83d5e72bf7ef1837787f6932d8df0bad753f012133a7ae483fbe6f0da546c2feac02ad3592864ae0af73abd1005eb665e690105846ad7049fc5cc63d0bcca6cc72151791a71b61ea587de05aa2a9b9f22b6ab32af0099c4e91aea22981ab43d63255a7aff985f9ae1fc189945899961ba25d10c659377207479bc790999cd9e204f581c4c80c2e827fb7a554eb1948a7c7c0497fd81b", 0xd9, 0x4}, {&(0x7f0000000200)="f71bbd797260363612b2137edaf3918f5661095d350616f51227167c8ee6d5cbe3673590fb851ef44abf1ec87075073f71a31b949f8196a58293fbb98d335731899822f6b5786696777d232c965891a4e7b97e753585ba9beaa006f171754bf19d7c29ddac3b2ee1", 0x68, 0x9}, {&(0x7f0000000280)="92a303c91663321ee41beed84ea196d52cd11294f6ed0bc40fb586f25baacd410da44c3abef77d36fe3f20090e9699cb30630f3c663d991e9646c080d6f4d2377a529cb6599107aaa25520436f643c3c3386565d839ec6ac0e32f05012c1b909b3d1654178e48808fbef913501aacf1bcb0b8e4553e6740c8088ff63d16656b68d95d11437972a1f72a3cd50626525df9157be65390b1bffb9c0eaee7b595b28e220b81a", 0xa4, 0x20}, {&(0x7f0000000340)="9dfe33488d3b162c7f6c89bff2ce4979d143513beae9f3f626805836d4f699a2caa4ffb951c24b9aa2ff8568130268ad2c95d161544b3b0471813fea06203478bc29944c5ff0b9c257e45766f3e1357c3369aabf591e66fc71caf99ab388a2", 0x5f, 0x9}, {&(0x7f00000003c0)="f411d3db350f5e77e543ef8d90585fc9430cd5d37abcbb9fd0c7fe5d4e4139c0ef3127d0ec66cb9074cd005c9fff592e21381c5c6d191c380cdab484d007c1dd208b41bdfe99ba8d99c3d996141c3f33cb9c85c0f953bc7b2f0e82ce5e5076cf1143261a1a8f46d041a9ad7cd079827174d6643ebabaf1d2fcc098a361823462442a4f29d13bd38d26ce43c0c7894b49e9cfec360c08", 0x96, 0x1}], 0x864000, &(0x7f00000005c0)={[{@usrquota='usrquota'}], [{@smackfsroot={'smackfsroot', 0x3d, 'euid'}}, {@euid_eq={'euid', 0x3d, r0}}, {@fsmagic={'fsmagic', 0x3d, 0x1}}, {@dont_appraise='dont_appraise'}]}) r2 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000640)='/proc/capi/capi20\x00', 0x40, 0x0) ioctl$KVM_SET_SREGS(r2, 0x4138ae84, &(0x7f0000000680)={{0x10f000, 0x110000, 0xf, 0x7f, 0x2, 0x0, 0x2, 0x80000001, 0x1, 0x7fff800, 0x3e, 0x4}, {0x1, 0xf000, 0xe, 0x7, 0x5e, 0x126e, 0x40, 0x1, 0x5, 0x8, 0x8}, {0x0, 0x3004, 0x10, 0x55, 0xfaa7, 0x1f, 0x5, 0x8001, 0x2, 0x6, 0x8000, 0x2}, {0x1f000, 0x0, 0x9, 0xd, 0x1, 0x5, 0x9, 0xffffffff, 0x80, 0x23, 0x1f, 0x200}, {0x4006, 0x4001, 0x0, 0xdbc, 0xffffffffffffd65c, 0x7, 0x3, 0x8001, 0x5, 0x9, 0x40, 0x1}, {0xd000, 0x17000, 0x1e, 0x1, 0x4, 0x4, 0x0, 0x1, 0x4, 0x3, 0x4, 0x6}, {0x0, 0x102000, 0xf, 0x8, 0x1000, 0xab78, 0x1, 0x9, 0x3ff, 0x11, 0xa8, 0x8}, {0x110000, 0x0, 0xc, 0x0, 0xff, 0xfffffffffffffff7, 0x1, 0xa5, 0x2, 0xfffffffffffffffc, 0x50, 0xcc9d}, {0x0, 0x10000}, {0xf000, 0x2001}, 0x20000000, 0x0, 0x10f004, 0x200, 0x0, 0x800, 0x3004, [0x1, 0x6, 0x0, 0x1000]}) 04:22:42 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 04:22:42 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0xf0ffffffffffff}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:42 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x1400000000000000, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:42 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xff0f, 0x0) [ 2417.053852][T11954] JFS: Cannot determine volume size [ 2417.061378][T11954] JFS: Cannot determine volume size 04:22:42 executing program 1 (fault-call:3 fault-nth:12): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) 04:22:42 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x100000000000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:42 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x2000000000000000, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2417.103212][T11954] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:22:42 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x2800000000000000, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2417.244110][T11967] FAULT_INJECTION: forcing a failure. [ 2417.244110][T11967] name failslab, interval 1, probability 0, space 0, times 0 [ 2417.285503][T11967] CPU: 0 PID: 11967 Comm: syz-executor1 Not tainted 5.0.0-rc2-next-20190115 #12 [ 2417.294564][T11967] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2417.304622][T11967] Call Trace: [ 2417.307927][T11967] dump_stack+0x1db/0x2d0 [ 2417.312267][T11967] ? dump_stack_print_info.cold+0x20/0x20 [ 2417.317995][T11967] ? vprintk_func+0x86/0x189 [ 2417.322601][T11967] should_fail.cold+0xa/0x14 [ 2417.327201][T11967] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2417.333018][T11967] ? ___might_sleep+0x1e7/0x310 [ 2417.337874][T11967] ? arch_local_save_flags+0x50/0x50 [ 2417.343169][T11967] __should_failslab+0x121/0x190 [ 2417.348113][T11967] should_failslab+0x9/0x14 [ 2417.352614][T11967] kmem_cache_alloc+0x2be/0x710 [ 2417.357482][T11967] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2417.362775][T11967] __kernfs_new_node+0xfe/0x8a0 [ 2417.367632][T11967] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 2417.373090][T11967] ? wait_for_completion+0x810/0x810 [ 2417.378381][T11967] ? __lock_is_held+0xb6/0x140 [ 2417.383159][T11967] ? mutex_unlock+0xd/0x10 [ 2417.387576][T11967] ? kernfs_activate+0x21c/0x2c0 [ 2417.392538][T11967] kernfs_new_node+0x99/0x130 [ 2417.397208][T11967] __kernfs_create_file+0x51/0x340 [ 2417.402320][T11967] sysfs_add_file_mode_ns+0x222/0x560 [ 2417.407707][T11967] internal_create_group+0x3d2/0xd80 [ 2417.413012][T11967] ? remove_files.isra.0+0x190/0x190 [ 2417.418302][T11967] ? down_read+0x120/0x120 [ 2417.422723][T11967] ? resched_curr+0x1a0/0x1a0 [ 2417.427405][T11967] sysfs_create_group+0x20/0x30 04:22:42 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x200000000000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) [ 2417.432265][T11967] lo_ioctl+0x1147/0x23e0 [ 2417.436601][T11967] ? lo_rw_aio+0x1e50/0x1e50 [ 2417.441193][T11967] ? __fget+0x473/0x710 [ 2417.445345][T11967] ? lo_rw_aio+0x1e50/0x1e50 [ 2417.449938][T11967] blkdev_ioctl+0x10e0/0x2120 [ 2417.454613][T11967] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2417.460861][T11967] ? blkpg_ioctl+0xc10/0xc10 [ 2417.465457][T11967] ? lock_downgrade+0xbe0/0xbe0 [ 2417.470306][T11967] ? kasan_check_read+0x11/0x20 [ 2417.475158][T11967] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2417.481143][T11967] ? rcu_read_unlock_special+0x380/0x380 [ 2417.486787][T11967] ? __fget+0x49a/0x710 [ 2417.490952][T11967] block_ioctl+0xee/0x130 [ 2417.495285][T11967] ? blkdev_fallocate+0x410/0x410 [ 2417.500317][T11967] do_vfs_ioctl+0x107b/0x17d0 [ 2417.504993][T11967] ? putname+0xef/0x130 [ 2417.509150][T11967] ? ioctl_preallocate+0x2f0/0x2f0 [ 2417.514267][T11967] ? __fget_light+0x2db/0x420 [ 2417.518943][T11967] ? fget_raw+0x20/0x20 [ 2417.523099][T11967] ? do_sys_open+0x3f9/0x7c0 [ 2417.527694][T11967] ? do_syscall_64+0x8c/0x800 [ 2417.532369][T11967] ? do_syscall_64+0x8c/0x800 [ 2417.537048][T11967] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2417.542336][T11967] ? security_file_ioctl+0x93/0xc0 [ 2417.547449][T11967] ksys_ioctl+0xab/0xd0 [ 2417.551619][T11967] __x64_sys_ioctl+0x73/0xb0 [ 2417.556214][T11967] do_syscall_64+0x1a3/0x800 [ 2417.560807][T11967] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2417.566439][T11967] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2417.572178][T11967] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2417.577731][T11967] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2417.583619][T11967] RIP: 0033:0x457d37 [ 2417.587511][T11967] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 cd b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2417.607116][T11967] RSP: 002b:00007f18dfc72a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2417.615525][T11967] RAX: ffffffffffffffda RBX: 0000000020000690 RCX: 0000000000457d37 [ 2417.623511][T11967] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 2417.631479][T11967] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2417.639448][T11967] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 2417.647414][T11967] R13: 0000000000000000 R14: 00000000004db990 R15: 0000000000000004 [ 2417.693496][T11954] JFS: Cannot determine volume size 04:22:43 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x100000, 0x0) [ 2417.718614][T11954] JFS: Cannot determine volume size 04:22:43 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 2417.779079][T11954] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:22:43 executing program 0: r0 = socket$kcm(0x29, 0x2, 0x0) r1 = getpgid(0xffffffffffffffff) ioctl$sock_FIOSETOWN(r0, 0x8901, &(0x7f0000000040)=r1) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000001700)=ANY=[@ANYBLOB="726500697a652c726573697a652c4b9f8cc974726573697a653d3078303030303030303030303030303030302c646973636172643d30783030303030303030303030303032303068617e7365743d6d6163726f6d616e2c726573697a653d3078303030303030303030303030303430302c6673636f6e746578743d73797374656d5f752c00000000", @ANYRESDEC=0x0, @ANYBLOB="0200"]) 04:22:43 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x3f00000000000000, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:43 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x300000000000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:43 executing program 1 (fault-call:3 fault-nth:13): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) 04:22:43 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 04:22:43 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x400000000000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:43 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x4000000000000000, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:43 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x400000, 0x0) [ 2418.035909][T11990] jfs: Unrecognized mount option "re" or missing value 04:22:43 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x600000000000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) [ 2418.120676][T11998] FAULT_INJECTION: forcing a failure. [ 2418.120676][T11998] name failslab, interval 1, probability 0, space 0, times 0 [ 2418.159254][T11998] CPU: 0 PID: 11998 Comm: syz-executor1 Not tainted 5.0.0-rc2-next-20190115 #12 [ 2418.168309][T11998] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2418.178368][T11998] Call Trace: [ 2418.181675][T11998] dump_stack+0x1db/0x2d0 [ 2418.186021][T11998] ? dump_stack_print_info.cold+0x20/0x20 [ 2418.191761][T11998] ? vprintk_func+0x86/0x189 [ 2418.196368][T11998] should_fail.cold+0xa/0x14 [ 2418.200965][T11998] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2418.206782][T11998] ? ___might_sleep+0x1e7/0x310 [ 2418.211640][T11998] ? arch_local_save_flags+0x50/0x50 [ 2418.216934][T11998] __should_failslab+0x121/0x190 [ 2418.221869][T11998] should_failslab+0x9/0x14 [ 2418.226368][T11998] kmem_cache_alloc+0x2be/0x710 [ 2418.231224][T11998] ? __mutex_unlock_slowpath+0x195/0x870 [ 2418.236887][T11998] __kernfs_new_node+0xfe/0x8a0 [ 2418.241742][T11998] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 2418.247210][T11998] ? mutex_unlock+0xd/0x10 [ 2418.251634][T11998] ? kernfs_activate+0x21c/0x2c0 [ 2418.256571][T11998] ? kernfs_walk_and_get_ns+0x340/0x340 [ 2418.262122][T11998] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2418.268362][T11998] ? kernfs_link_sibling+0x210/0x420 [ 2418.273655][T11998] kernfs_new_node+0x99/0x130 [ 2418.278340][T11998] __kernfs_create_file+0x51/0x340 [ 2418.283457][T11998] sysfs_add_file_mode_ns+0x222/0x560 [ 2418.288834][T11998] internal_create_group+0x3d2/0xd80 [ 2418.294128][T11998] ? remove_files.isra.0+0x190/0x190 [ 2418.299408][T11998] ? down_read+0x120/0x120 [ 2418.303830][T11998] ? resched_curr+0x1a0/0x1a0 [ 2418.308516][T11998] sysfs_create_group+0x20/0x30 [ 2418.313364][T11998] lo_ioctl+0x1147/0x23e0 [ 2418.317698][T11998] ? lo_rw_aio+0x1e50/0x1e50 [ 2418.322287][T11998] ? __fget+0x473/0x710 [ 2418.326446][T11998] ? lo_rw_aio+0x1e50/0x1e50 [ 2418.331038][T11998] blkdev_ioctl+0x10e0/0x2120 [ 2418.335719][T11998] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2418.341962][T11998] ? blkpg_ioctl+0xc10/0xc10 [ 2418.346560][T11998] ? lock_downgrade+0xbe0/0xbe0 [ 2418.351409][T11998] ? kasan_check_read+0x11/0x20 [ 2418.356262][T11998] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2418.362244][T11998] ? rcu_read_unlock_special+0x380/0x380 [ 2418.367888][T11998] ? __fget+0x49a/0x710 [ 2418.372053][T11998] block_ioctl+0xee/0x130 [ 2418.376387][T11998] ? blkdev_fallocate+0x410/0x410 [ 2418.381413][T11998] do_vfs_ioctl+0x107b/0x17d0 [ 2418.386092][T11998] ? putname+0xef/0x130 [ 2418.390253][T11998] ? ioctl_preallocate+0x2f0/0x2f0 [ 2418.395364][T11998] ? __fget_light+0x2db/0x420 [ 2418.400046][T11998] ? fget_raw+0x20/0x20 [ 2418.404210][T11998] ? do_sys_open+0x3f9/0x7c0 [ 2418.408801][T11998] ? do_syscall_64+0x8c/0x800 [ 2418.413486][T11998] ? do_syscall_64+0x8c/0x800 [ 2418.418161][T11998] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2418.423450][T11998] ? security_file_ioctl+0x93/0xc0 [ 2418.428564][T11998] ksys_ioctl+0xab/0xd0 [ 2418.432729][T11998] __x64_sys_ioctl+0x73/0xb0 [ 2418.437318][T11998] do_syscall_64+0x1a3/0x800 [ 2418.441907][T11998] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2418.447539][T11998] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2418.453267][T11998] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2418.458824][T11998] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2418.464714][T11998] RIP: 0033:0x457d37 [ 2418.468619][T11998] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 cd b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2418.488219][T11998] RSP: 002b:00007f18dfc72a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2418.496630][T11998] RAX: ffffffffffffffda RBX: 0000000020000690 RCX: 0000000000457d37 [ 2418.504605][T11998] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 2418.512573][T11998] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 04:22:44 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x4305000000000000, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:44 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000001700)={[{@resize='resize'}, {@resize='resize'}, {@resize_size={'resize'}}, {@discard_size={'discard', 0x3d, 0x200}}, {@iocharset={'iocharset', 0x3d, 'macroman'}}, {@resize_size={'resize', 0x3d, 0x400}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@euid_eq={'euid'}}]}) r0 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x3, 0x2) faccessat(r0, &(0x7f0000000080)='./file0/file0\x00', 0x3, 0xc00) [ 2418.520544][T11998] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 2418.528509][T11998] R13: 0000000000000000 R14: 00000000004db990 R15: 0000000000000004 04:22:44 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 04:22:44 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x800e000000000000, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:44 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x700000000000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) [ 2418.657117][T12012] JFS: Cannot determine volume size 04:22:44 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 2418.699905][T12012] JFS: Cannot determine volume size [ 2418.705171][T12012] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:22:44 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x800000000000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:44 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x8035000000000000, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:44 executing program 1 (fault-call:3 fault-nth:14): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) 04:22:44 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x806000000000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:44 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, 0x0) [ 2418.880067][T12012] JFS: Cannot determine volume size [ 2418.885376][T12012] JFS: Cannot determine volume size 04:22:44 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 04:22:44 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x8100000000000000, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2418.930645][T12012] jfs: Unrecognized mount option "fscontext=system_u" or missing value [ 2418.931803][T12029] FAULT_INJECTION: forcing a failure. [ 2418.931803][T12029] name failslab, interval 1, probability 0, space 0, times 0 [ 2418.976790][T12029] CPU: 0 PID: 12029 Comm: syz-executor1 Not tainted 5.0.0-rc2-next-20190115 #12 [ 2418.985849][T12029] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2418.995900][T12029] Call Trace: [ 2418.999204][T12029] dump_stack+0x1db/0x2d0 [ 2419.003537][T12029] ? dump_stack_print_info.cold+0x20/0x20 [ 2419.009262][T12029] ? add_lock_to_list.isra.0+0x450/0x450 [ 2419.014899][T12029] ? kernfs_activate+0x8f/0x2c0 [ 2419.019765][T12029] should_fail.cold+0xa/0x14 [ 2419.024358][T12029] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2419.030178][T12029] ? ___might_sleep+0x1e7/0x310 [ 2419.035032][T12029] ? arch_local_save_flags+0x50/0x50 [ 2419.040333][T12029] __should_failslab+0x121/0x190 [ 2419.045270][T12029] should_failslab+0x9/0x14 [ 2419.049780][T12029] kmem_cache_alloc+0x2be/0x710 [ 2419.054631][T12029] ? __mutex_unlock_slowpath+0x195/0x870 [ 2419.060273][T12029] __kernfs_new_node+0xfe/0x8a0 [ 2419.065131][T12029] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 2419.070601][T12029] ? mutex_unlock+0xd/0x10 [ 2419.075021][T12029] ? kernfs_activate+0x21c/0x2c0 [ 2419.079964][T12029] ? kernfs_walk_and_get_ns+0x340/0x340 [ 2419.085511][T12029] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2419.091755][T12029] ? kernfs_link_sibling+0x210/0x420 [ 2419.097044][T12029] kernfs_new_node+0x99/0x130 [ 2419.101728][T12029] __kernfs_create_file+0x51/0x340 [ 2419.106843][T12029] sysfs_add_file_mode_ns+0x222/0x560 [ 2419.112235][T12029] internal_create_group+0x3d2/0xd80 [ 2419.117552][T12029] ? remove_files.isra.0+0x190/0x190 [ 2419.122836][T12029] ? down_read+0x120/0x120 [ 2419.127254][T12029] ? resched_curr+0x1a0/0x1a0 [ 2419.131946][T12029] sysfs_create_group+0x20/0x30 [ 2419.136798][T12029] lo_ioctl+0x1147/0x23e0 [ 2419.141133][T12029] ? lo_rw_aio+0x1e50/0x1e50 [ 2419.145723][T12029] ? __fget+0x473/0x710 [ 2419.149880][T12029] ? lo_rw_aio+0x1e50/0x1e50 [ 2419.154473][T12029] blkdev_ioctl+0x10e0/0x2120 [ 2419.159154][T12029] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2419.165392][T12029] ? blkpg_ioctl+0xc10/0xc10 [ 2419.169982][T12029] ? lock_downgrade+0xbe0/0xbe0 [ 2419.174831][T12029] ? kasan_check_read+0x11/0x20 [ 2419.179684][T12029] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2419.185667][T12029] ? rcu_read_unlock_special+0x380/0x380 [ 2419.191305][T12029] ? __fget+0x49a/0x710 [ 2419.195470][T12029] block_ioctl+0xee/0x130 [ 2419.199803][T12029] ? blkdev_fallocate+0x410/0x410 [ 2419.204828][T12029] do_vfs_ioctl+0x107b/0x17d0 [ 2419.209503][T12029] ? putname+0xef/0x130 [ 2419.213670][T12029] ? ioctl_preallocate+0x2f0/0x2f0 [ 2419.218782][T12029] ? __fget_light+0x2db/0x420 [ 2419.223460][T12029] ? fget_raw+0x20/0x20 [ 2419.227617][T12029] ? do_sys_open+0x3f9/0x7c0 [ 2419.232213][T12029] ? do_syscall_64+0x8c/0x800 [ 2419.236889][T12029] ? do_syscall_64+0x8c/0x800 [ 2419.241573][T12029] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2419.246858][T12029] ? security_file_ioctl+0x93/0xc0 [ 2419.251977][T12029] ksys_ioctl+0xab/0xd0 [ 2419.256139][T12029] __x64_sys_ioctl+0x73/0xb0 [ 2419.260747][T12029] do_syscall_64+0x1a3/0x800 [ 2419.265354][T12029] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2419.270986][T12029] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2419.276712][T12029] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2419.282264][T12029] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2419.288154][T12029] RIP: 0033:0x457d37 [ 2419.292049][T12029] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 cd b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2419.311650][T12029] RSP: 002b:00007f18dfc72a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2419.320057][T12029] RAX: ffffffffffffffda RBX: 0000000020000690 RCX: 0000000000457d37 [ 2419.328023][T12029] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 2419.335988][T12029] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2419.343956][T12029] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 2419.351941][T12029] R13: 0000000000000000 R14: 00000000004db990 R15: 0000000000000004 04:22:44 executing program 0: r0 = socket$vsock_dgram(0x28, 0x2, 0x0) write$binfmt_aout(r0, &(0x7f0000000100)={{0x108, 0x5, 0x7, 0x23e, 0x98, 0x21, 0x2e7, 0x1}, "d8a37d2ac8aee8353f51990e90d9854d790c2f4878e2907d908a8fa4fe48ccb61173e5d9c7453b5143f1ac39853cff5939ca314004e804666ac6c899ecc81f1cdc6fd3f393cbf8bb81566283f0eb17941e1871e3a58bb9e3ec2f3325a030e098cb03467331747b1dd42592bd30f8f1b5fde5a21402ee8b636c92c5505f43fe9627afafaeef46076703a3f34cbbe126dbd5eceb33370759f5eafa1a263e0227480375661d6021e897ba9869262aa1e529636728afc1a4a34a439886b34786bba6e0a63d0604225a4d38297ad908eb12d8233c8915fc8f61e3ccc2e1e1094e2227cc35", [[], [], []]}, 0x402) r1 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/ip_tables_matches\x00') write$evdev(r1, &(0x7f0000000540)=[{{}, 0x17, 0x8000}, {{}, 0x15, 0x8000, 0xe5}], 0x30) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000001700)={[{@resize='resize'}, {@resize='resize'}, {@resize_size={'resize'}}, {@discard_size={'discard', 0x3d, 0x200}}, {@iocharset={'iocharset', 0x3d, 'macroman'}}, {@resize_size={'resize', 0x3d, 0x400}}]}) 04:22:44 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0xd00000000000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:45 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x86ddffff00000000, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:45 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x1000000000000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:45 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000, 0x0) 04:22:45 executing program 1 (fault-call:3 fault-nth:15): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) 04:22:45 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 04:22:45 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x1100000000000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) [ 2419.634070][T12046] JFS: Cannot determine volume size [ 2419.652878][T12046] JFS: Cannot determine volume size 04:22:45 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x8847000000000000, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2419.694128][T12046] resize option for remount only [ 2419.702470][T12053] FAULT_INJECTION: forcing a failure. [ 2419.702470][T12053] name failslab, interval 1, probability 0, space 0, times 0 [ 2419.715677][T12053] CPU: 1 PID: 12053 Comm: syz-executor1 Not tainted 5.0.0-rc2-next-20190115 #12 [ 2419.724705][T12053] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2419.735021][T12053] Call Trace: [ 2419.738320][T12053] dump_stack+0x1db/0x2d0 [ 2419.742660][T12053] ? dump_stack_print_info.cold+0x20/0x20 [ 2419.748392][T12053] ? print_usage_bug+0xd0/0xd0 [ 2419.753168][T12053] should_fail.cold+0xa/0x14 [ 2419.757765][T12053] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2419.763573][T12053] ? find_held_lock+0x35/0x120 [ 2419.768335][T12053] ? is_bpf_text_address+0xac/0x170 [ 2419.773536][T12053] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2419.779784][T12053] __should_failslab+0x121/0x190 [ 2419.784724][T12053] should_failslab+0x9/0x14 [ 2419.789223][T12053] kmem_cache_alloc+0x47/0x710 [ 2419.793978][T12053] ? print_usage_bug+0xd0/0xd0 [ 2419.798747][T12053] radix_tree_node_alloc.constprop.0+0x1eb/0x340 [ 2419.805325][T12053] idr_get_free+0x72c/0xee0 [ 2419.809830][T12053] ? __save_stack_trace+0x8a/0xf0 [ 2419.814868][T12053] ? radix_tree_iter_tag_clear+0x90/0x90 [ 2419.820505][T12053] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2419.826304][T12053] ? kasan_slab_alloc+0xf/0x20 [ 2419.831065][T12053] ? kmem_cache_alloc+0x12d/0x710 [ 2419.836085][T12053] ? kernfs_new_node+0x99/0x130 [ 2419.840930][T12053] ? __kernfs_create_file+0x51/0x340 [ 2419.846219][T12053] ? sysfs_add_file_mode_ns+0x222/0x560 [ 2419.851766][T12053] ? internal_create_group+0x3d2/0xd80 [ 2419.857226][T12053] ? sysfs_create_group+0x20/0x30 [ 2419.862248][T12053] ? lo_ioctl+0x1147/0x23e0 [ 2419.866745][T12053] ? blkdev_ioctl+0x10e0/0x2120 [ 2419.871608][T12053] ? block_ioctl+0xee/0x130 [ 2419.876107][T12053] ? do_vfs_ioctl+0x107b/0x17d0 [ 2419.880951][T12053] ? ksys_ioctl+0xab/0xd0 [ 2419.885273][T12053] ? __x64_sys_ioctl+0x73/0xb0 [ 2419.890032][T12053] ? do_syscall_64+0x1a3/0x800 [ 2419.894796][T12053] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2419.900860][T12053] ? print_usage_bug+0xd0/0xd0 [ 2419.905635][T12053] idr_alloc_u32+0x1d8/0x3a0 [ 2419.910227][T12053] ? __fprop_inc_percpu_max+0x2d0/0x2d0 [ 2419.915774][T12053] ? lock_acquire+0x1db/0x570 [ 2419.920452][T12053] ? __kernfs_new_node+0x125/0x8a0 [ 2419.925572][T12053] idr_alloc_cyclic+0x153/0x330 [ 2419.930427][T12053] ? idr_alloc+0x1b0/0x1b0 [ 2419.934850][T12053] __kernfs_new_node+0x1c1/0x8a0 [ 2419.939803][T12053] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 2419.945269][T12053] ? mutex_unlock+0xd/0x10 [ 2419.949694][T12053] ? kernfs_activate+0x21c/0x2c0 [ 2419.954629][T12053] ? kernfs_walk_and_get_ns+0x340/0x340 [ 2419.960178][T12053] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2419.966418][T12053] ? kernfs_link_sibling+0x210/0x420 [ 2419.972211][T12053] kernfs_new_node+0x99/0x130 [ 2419.976911][T12053] __kernfs_create_file+0x51/0x340 [ 2419.982029][T12053] sysfs_add_file_mode_ns+0x222/0x560 [ 2419.987412][T12053] internal_create_group+0x3d2/0xd80 [ 2419.992710][T12053] ? remove_files.isra.0+0x190/0x190 [ 2419.997993][T12053] ? down_read+0x120/0x120 [ 2420.002414][T12053] ? resched_curr+0x1a0/0x1a0 [ 2420.007095][T12053] sysfs_create_group+0x20/0x30 [ 2420.011943][T12053] lo_ioctl+0x1147/0x23e0 [ 2420.016274][T12053] ? lo_rw_aio+0x1e50/0x1e50 [ 2420.020862][T12053] ? __fget+0x473/0x710 [ 2420.025015][T12053] ? lo_rw_aio+0x1e50/0x1e50 [ 2420.029604][T12053] blkdev_ioctl+0x10e0/0x2120 [ 2420.034280][T12053] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2420.040515][T12053] ? blkpg_ioctl+0xc10/0xc10 [ 2420.045104][T12053] ? lock_downgrade+0xbe0/0xbe0 [ 2420.049957][T12053] ? kasan_check_read+0x11/0x20 [ 2420.054809][T12053] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2420.060791][T12053] ? rcu_read_unlock_special+0x380/0x380 [ 2420.066431][T12053] ? __fget+0x49a/0x710 [ 2420.070595][T12053] block_ioctl+0xee/0x130 [ 2420.074924][T12053] ? blkdev_fallocate+0x410/0x410 [ 2420.079944][T12053] do_vfs_ioctl+0x107b/0x17d0 [ 2420.084623][T12053] ? putname+0xef/0x130 [ 2420.088780][T12053] ? ioctl_preallocate+0x2f0/0x2f0 [ 2420.093890][T12053] ? __fget_light+0x2db/0x420 [ 2420.098567][T12053] ? fget_raw+0x20/0x20 [ 2420.102727][T12053] ? do_sys_open+0x3f9/0x7c0 [ 2420.107320][T12053] ? do_syscall_64+0x8c/0x800 [ 2420.112004][T12053] ? do_syscall_64+0x8c/0x800 [ 2420.116681][T12053] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2420.121965][T12053] ? security_file_ioctl+0x93/0xc0 [ 2420.127080][T12053] ksys_ioctl+0xab/0xd0 [ 2420.131236][T12053] __x64_sys_ioctl+0x73/0xb0 [ 2420.135826][T12053] do_syscall_64+0x1a3/0x800 [ 2420.140415][T12053] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2420.146045][T12053] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2420.151765][T12053] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2420.157318][T12053] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2420.163208][T12053] RIP: 0033:0x457d37 [ 2420.167184][T12053] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 cd b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2420.186784][T12053] RSP: 002b:00007f18dfc72a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2420.195194][T12053] RAX: ffffffffffffffda RBX: 0000000020000690 RCX: 0000000000457d37 [ 2420.203162][T12053] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 2420.211133][T12053] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2420.219101][T12053] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 2420.227065][T12053] R13: 0000000000000000 R14: 00000000004db990 R15: 0000000000000004 04:22:45 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x1400000000000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:45 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x8848000000000000, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:45 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x48, 0x1fc, 0x0, 0x5, &(0x7f0000000280)=ANY=[@ANYBLOB="726573697a652c646973636172642c726573697a653d3078303030303030303030303030303030302c646973636172643d3078303030303030303030303030303230302c696f63ff61727365743d6d6163726f6d616e2c72657369a37a653d3088303030303030303030303130303430302c6673636f6e74657874e5ed462f1575398003d3de8fa1693d73797374656d5f752c6673757569643d77673738633461662d666566362d3b767a002d38"]) r0 = syz_open_dev$vbi(&(0x7f0000000180)='/dev/vbi#\x00', 0x3, 0x2) ioctl$VIDIOC_ENUM_FMT(r0, 0xc0405602, &(0x7f0000000740)={0x3f, 0xa, 0x1, "b3eba03bb8871dcc03c18883b4c686a9d403159e2bd63344ef324f156e2d1d13", 0x3131354f}) write$P9_RRENAMEAT(r0, &(0x7f00000000c0)={0x7, 0x4b, 0x1}, 0x7) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f00000001c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="6a0000008ce57c2631d72fd184cf08e5bf8cbe9649a2ccc6aefc1d143b9dec8df2ca79fde33cf4c8b8e9e780af20c23e5421a94ecd65009a0e1de481bdb11b6644e4ce577696387c11a2a7df076c6e189d81847839fcefc251d529188dafd3c68d774a504d92cd4b2406110aa31d"], &(0x7f0000000240)=0x72) fstat(r0, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$jfs(&(0x7f00000004c0)='jfs\x00', &(0x7f0000000500)='./file0\x00', 0x9, 0x2, &(0x7f0000000600)=[{&(0x7f0000000540)="d36783a77503d194b7bfdfb6d8e08509ad507766ea6a23b46291e6904a26d7e7274add3b34247f8e3e786dc40dd78be9cf52a377ca079f60e4ac49ae6d43a2357e637c3b4acaa73748ac137214cbbcba5dafa73b7d", 0x55, 0x1}, {&(0x7f00000005c0)="20b67766dce48576b51e34c5db61d6cced208c699fd9f2b0", 0x18, 0x3}], 0x1448, &(0x7f00000006c0)={[{@iocharset={'iocharset', 0x3d, 'cp857'}}], [{@uid_gt={'uid>', r1}}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@smackfsroot={'smackfsroot', 0x3d, 'self&'}}, {@fsuuid={'fsuuid', 0x3d, {[0x61, 0x63, 0x64, 0x38, 0x3d, 0x77, 0x76, 0x30], 0x2d, [0x39, 0x0, 0x64, 0x33], 0x2d, [0x73, 0x77, 0x0, 0x34], 0x2d, [0x5d2d6bb7d29ae997, 0x37, 0x31, 0x67], 0x2d, [0x31, 0x0, 0x31, 0x37, 0x7b, 0x3f, 0xd3d47881656a3987, 0x73]}}}]}) ioctl$sock_inet_SIOCDELRT(r0, 0x890c, &(0x7f0000000e00)={0x0, {0x2, 0x4e21, @multicast1}, {0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x24}}, {0x2, 0x4e22, @empty}, 0x40, 0x0, 0x0, 0x0, 0xffffffffffffffe1, &(0x7f0000000dc0)='syzkaller1\x00', 0x3, 0x4, 0x7}) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000ec0)={0x0, 0x43, "6f40b38e253ce7621afd693785f11c5aeaf60ff53b4a3de0e286cee5b8ff1d0d328ac5228b404742ed2988e0006e0de7bb23992b1b4c277aab6a7983d495ab3b2f2f18"}, &(0x7f0000000f40)=0x4b) getsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000e80)={0x8001, 0x8000, 0x7, 0x2, r2}, &(0x7f0000000480)=0xffffffffffffff2a) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000340)={{{@in6=@dev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in6=@empty}}, &(0x7f0000000080)=0xe8) setsockopt$inet_pktinfo(r0, 0x0, 0x8, &(0x7f0000000140)={r3, @multicast2, @broadcast}, 0xc) write$P9_RREADLINK(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="a75b3000000000"], 0x10) r4 = syz_genetlink_get_family_id$team(&(0x7f00000007c0)='team\x00') sendmsg$TEAM_CMD_PORT_LIST_GET(r0, &(0x7f0000000d80)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x10108204}, 0xc, &(0x7f0000000d40)={&(0x7f0000000800)={0x538, r4, 0x502, 0x70bd2d, 0x4, {}, [{{0x8, 0x1, r3}, {0x7c, 0x2, [{0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'loadbalance\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x10000}}}]}}, {{0x8, 0x1, r3}, {0x90, 0x2, [{0x54, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x24, 0x4, [{0x1000000000, 0x3, 0x2, 0xea}, {0xf4, 0x5, 0xe55, 0x1}, {0x19494622, 0x101, 0x3, 0x3}, {0x100, 0x3f, 0x100000000, 0x93c5}]}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r3}}}]}}, {{0x8, 0x1, r3}, {0x228, 0x2, [{0x3c, 0x1, @user_linkup={{{0x24, 0x1, 'user_linkup\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r3}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x41}}, {0x8, 0x6, r3}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8}}, {0x8, 0x6, r3}}}, {0x40, 0x1, @lb_port_stats={{{0x24, 0x1, 'lb_port_stats\x00'}, {0x8}, {0x8}}, {0x8, 0x6, r3}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r3}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r3}}}]}}, {{0x8, 0x1, r3}, {0x78, 0x2, [{0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x3bf}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0x5, 0x8, 0x1, 0xdb4d}]}}}]}}, {{0x8, 0x1, r3}, {0x74, 0x2, [{0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x7fffffff}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r3}}}]}}, {{0x8, 0x1, r3}, {0x44, 0x2, [{0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x8}}, {0x8, 0x6, r3}}}]}}, {{0x8, 0x1, r3}, {0x88, 0x2, [{0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x54, 0x4, [{0xaf9, 0x5, 0x10000, 0x8}, {0xffffffff, 0x1, 0x2, 0xfffffffffffffffb}, {0x6f08, 0x69, 0xfffffffffffff8bc, 0x10001}, {0x100000000, 0x0, 0xfffffffffffffff8, 0x8}, {0xfd, 0x3, 0x0, 0x100000000}, {0x7, 0xd5d1, 0x4, 0x100000001}, {0x1, 0x8, 0x3f, 0x5}, {0x1, 0x3, 0x4, 0x2}, {0x8, 0x8, 0x8ca0, 0x9a7d}, {0x7, 0x80, 0x40, 0x5}]}}}]}}]}, 0x538}}, 0x20000000) readahead(r0, 0x4, 0xabd3) 04:22:45 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\xff', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 04:22:45 executing program 1 (fault-call:3 fault-nth:16): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) 04:22:46 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x3000000, 0x0) 04:22:46 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x1c00000000000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:46 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x8864000000000000, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:46 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000001700)=ANY=[@ANYBLOB="726573697a652c726573697a652c726573697a653d3078303030303030303030303030303030302c646973636172643d3078303030303030303030303030303230302c696f636861727365743d6d6163726f6d616e2c726573697a653d3078060000003030303030303030303430302c6673636f6e746578743d73797374656d5f752c657569643d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x202002, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000340)={{{@in=@remote, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{}, 0x0, @in6=@initdev}}, &(0x7f0000000440)=0xffffffffffffffa7) ioctl$ifreq_SIOCGIFINDEX_vcan(r0, 0x8933, &(0x7f0000000080)={'vcan0\x00', r1}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000100)={{{@in=@empty, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast2}, 0x0, @in6=@empty}}, &(0x7f0000000200)=0xe8) setsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000240)={{{@in=@dev={0xac, 0x14, 0x14, 0x15}, @in6=@mcast2, 0x4e23, 0xfffffffffffff001, 0x4e23, 0x9, 0xa, 0x80, 0x20, 0x0, r2, r3}, {0x6, 0xe77, 0x3, 0x200, 0x7fff, 0xfffffffffffffffc, 0xa8, 0x7fff}, {0x4, 0xc942, 0xfffffffffffffffe, 0xb}, 0x1ff, 0x6e6bb4, 0x1, 0x0, 0x1}, {{@in=@rand_addr=0x401, 0x4d6, 0x2b}, 0xa, @in=@multicast1, 0x3504, 0x0, 0xe756dbb26e121036, 0x8, 0x9, 0x5, 0x2}}, 0xe8) [ 2420.556499][T12072] FAULT_INJECTION: forcing a failure. [ 2420.556499][T12072] name failslab, interval 1, probability 0, space 0, times 0 [ 2420.586309][T12072] CPU: 1 PID: 12072 Comm: syz-executor1 Not tainted 5.0.0-rc2-next-20190115 #12 [ 2420.595370][T12072] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2420.605434][T12072] Call Trace: [ 2420.608736][T12072] dump_stack+0x1db/0x2d0 [ 2420.613077][T12072] ? dump_stack_print_info.cold+0x20/0x20 [ 2420.618800][T12072] ? add_lock_to_list.isra.0+0x450/0x450 [ 2420.624445][T12072] ? kernfs_activate+0x8f/0x2c0 [ 2420.629313][T12072] should_fail.cold+0xa/0x14 [ 2420.633908][T12072] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2420.639725][T12072] ? ___might_sleep+0x1e7/0x310 [ 2420.644569][T12072] ? arch_local_save_flags+0x50/0x50 [ 2420.649860][T12072] __should_failslab+0x121/0x190 [ 2420.654798][T12072] should_failslab+0x9/0x14 [ 2420.659308][T12072] kmem_cache_alloc+0x2be/0x710 [ 2420.664160][T12072] ? __mutex_unlock_slowpath+0x195/0x870 [ 2420.669798][T12072] __kernfs_new_node+0xfe/0x8a0 [ 2420.674654][T12072] ? kernfs_dop_revalidate+0x3c0/0x3c0 [ 2420.680119][T12072] ? mutex_unlock+0xd/0x10 [ 2420.684532][T12072] ? kernfs_activate+0x21c/0x2c0 [ 2420.689470][T12072] ? kernfs_walk_and_get_ns+0x340/0x340 [ 2420.695014][T12072] ? __sanitizer_cov_trace_const_cmp2+0x18/0x20 [ 2420.701248][T12072] ? kernfs_link_sibling+0x210/0x420 [ 2420.706536][T12072] kernfs_new_node+0x99/0x130 [ 2420.711218][T12072] __kernfs_create_file+0x51/0x340 [ 2420.716333][T12072] sysfs_add_file_mode_ns+0x222/0x560 [ 2420.721713][T12072] internal_create_group+0x3d2/0xd80 [ 2420.727012][T12072] ? remove_files.isra.0+0x190/0x190 [ 2420.732296][T12072] ? down_read+0x120/0x120 [ 2420.736845][T12072] ? resched_curr+0x1a0/0x1a0 [ 2420.741526][T12072] sysfs_create_group+0x20/0x30 [ 2420.746375][T12072] lo_ioctl+0x1147/0x23e0 [ 2420.750708][T12072] ? lo_rw_aio+0x1e50/0x1e50 [ 2420.755301][T12072] ? __fget+0x473/0x710 [ 2420.759458][T12072] ? lo_rw_aio+0x1e50/0x1e50 [ 2420.764046][T12072] blkdev_ioctl+0x10e0/0x2120 [ 2420.768719][T12072] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2420.774958][T12072] ? blkpg_ioctl+0xc10/0xc10 [ 2420.779547][T12072] ? lock_downgrade+0xbe0/0xbe0 [ 2420.784390][T12072] ? kasan_check_read+0x11/0x20 [ 2420.789853][T12072] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2420.795832][T12072] ? rcu_read_unlock_special+0x380/0x380 [ 2420.801501][T12072] ? __fget+0x49a/0x710 [ 2420.805678][T12072] block_ioctl+0xee/0x130 [ 2420.810039][T12072] ? blkdev_fallocate+0x410/0x410 [ 2420.815060][T12072] do_vfs_ioctl+0x107b/0x17d0 [ 2420.819736][T12072] ? putname+0xef/0x130 [ 2420.823891][T12072] ? ioctl_preallocate+0x2f0/0x2f0 [ 2420.829018][T12072] ? __fget_light+0x2db/0x420 [ 2420.833690][T12072] ? fget_raw+0x20/0x20 [ 2420.837843][T12072] ? do_sys_open+0x3f9/0x7c0 [ 2420.842452][T12072] ? do_syscall_64+0x8c/0x800 [ 2420.847132][T12072] ? do_syscall_64+0x8c/0x800 [ 2420.851807][T12072] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2420.857093][T12072] ? security_file_ioctl+0x93/0xc0 [ 2420.862204][T12072] ksys_ioctl+0xab/0xd0 [ 2420.866363][T12072] __x64_sys_ioctl+0x73/0xb0 [ 2420.870954][T12072] do_syscall_64+0x1a3/0x800 [ 2420.875547][T12072] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2420.881178][T12072] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2420.886896][T12072] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2420.892450][T12072] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2420.898337][T12072] RIP: 0033:0x457d37 [ 2420.902243][T12072] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 cd b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2420.921866][T12072] RSP: 002b:00007f18dfc72a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2420.930287][T12072] RAX: ffffffffffffffda RBX: 0000000020000690 RCX: 0000000000457d37 [ 2420.938252][T12072] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 2420.946223][T12072] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 04:22:46 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\xff', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 04:22:46 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x2000000000000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) [ 2420.954208][T12072] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 2420.962174][T12072] R13: 0000000000000000 R14: 00000000004db990 R15: 0000000000000004 04:22:46 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x88a8ffff00000000, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:46 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x3f00000000000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:46 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x4305000000000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:46 executing program 1 (fault-call:3 fault-nth:17): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) [ 2421.114903][T12082] JFS: Cannot determine volume size [ 2421.134997][T12082] JFS: Cannot determine volume size 04:22:46 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x4000000, 0x0) 04:22:46 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x88caffff00000000, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:46 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\xff', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 04:22:46 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x6000000000000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) [ 2421.208618][T12082] jfs: Unrecognized mount option "resize=0x" or missing value [ 2421.248482][T12097] FAULT_INJECTION: forcing a failure. [ 2421.248482][T12097] name failslab, interval 1, probability 0, space 0, times 0 [ 2421.271108][T12097] CPU: 1 PID: 12097 Comm: syz-executor1 Not tainted 5.0.0-rc2-next-20190115 #12 [ 2421.280156][T12097] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2421.290207][T12097] Call Trace: [ 2421.293533][T12097] dump_stack+0x1db/0x2d0 [ 2421.297875][T12097] ? dump_stack_print_info.cold+0x20/0x20 [ 2421.303607][T12097] should_fail.cold+0xa/0x14 [ 2421.308290][T12097] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2421.314101][T12097] ? ___might_sleep+0x1e7/0x310 [ 2421.318953][T12097] ? arch_local_save_flags+0x50/0x50 [ 2421.324240][T12097] ? vprintk_default+0x28/0x30 [ 2421.329004][T12097] ? vprintk_func+0x86/0x189 [ 2421.333595][T12097] __should_failslab+0x121/0x190 [ 2421.338536][T12097] should_failslab+0x9/0x14 [ 2421.343038][T12097] kmem_cache_alloc_trace+0x2d1/0x760 [ 2421.348423][T12097] kobject_uevent_env+0x2fb/0x102b [ 2421.353533][T12097] ? resched_curr+0x1a0/0x1a0 [ 2421.358216][T12097] kobject_uevent+0x20/0x26 [ 2421.362720][T12097] lo_ioctl+0x11c6/0x23e0 [ 2421.367053][T12097] ? lo_rw_aio+0x1e50/0x1e50 [ 2421.371640][T12097] ? __fget+0x473/0x710 [ 2421.375795][T12097] ? lo_rw_aio+0x1e50/0x1e50 [ 2421.380394][T12097] blkdev_ioctl+0x10e0/0x2120 [ 2421.385070][T12097] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2421.391320][T12097] ? blkpg_ioctl+0xc10/0xc10 [ 2421.395914][T12097] ? lock_downgrade+0xbe0/0xbe0 [ 2421.400762][T12097] ? kasan_check_read+0x11/0x20 [ 2421.405700][T12097] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2421.411678][T12097] ? rcu_read_unlock_special+0x380/0x380 [ 2421.417313][T12097] ? __fget+0x49a/0x710 [ 2421.421476][T12097] block_ioctl+0xee/0x130 [ 2421.425802][T12097] ? blkdev_fallocate+0x410/0x410 [ 2421.430825][T12097] do_vfs_ioctl+0x107b/0x17d0 [ 2421.435500][T12097] ? putname+0xef/0x130 [ 2421.439658][T12097] ? ioctl_preallocate+0x2f0/0x2f0 [ 2421.444769][T12097] ? __fget_light+0x2db/0x420 [ 2421.449450][T12097] ? fget_raw+0x20/0x20 [ 2421.453605][T12097] ? do_sys_open+0x3f9/0x7c0 [ 2421.458199][T12097] ? do_syscall_64+0x8c/0x800 [ 2421.462886][T12097] ? do_syscall_64+0x8c/0x800 [ 2421.467564][T12097] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2421.472847][T12097] ? security_file_ioctl+0x93/0xc0 [ 2421.477961][T12097] ksys_ioctl+0xab/0xd0 [ 2421.482122][T12097] __x64_sys_ioctl+0x73/0xb0 [ 2421.486717][T12097] do_syscall_64+0x1a3/0x800 [ 2421.491310][T12097] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2421.496945][T12097] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2421.502666][T12097] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2421.508215][T12097] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2421.514106][T12097] RIP: 0033:0x457d37 [ 2421.517999][T12097] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 cd b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2421.537600][T12097] RSP: 002b:00007f18dfc72a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2421.546009][T12097] RAX: ffffffffffffffda RBX: 0000000020000690 RCX: 0000000000457d37 04:22:47 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x8906000000000000, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2421.553972][T12097] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 2421.561942][T12097] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2421.569907][T12097] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 2421.577878][T12097] R13: 0000000000000000 R14: 00000000004db990 R15: 0000000000000004 [ 2421.773187][T12082] JFS: Cannot determine volume size [ 2421.783454][T12082] JFS: Cannot determine volume size [ 2421.798989][T12082] jfs: Unrecognized mount option "resize=0x" or missing value 04:22:47 executing program 0: r0 = eventfd2(0x0, 0x80000) fremovexattr(r0, &(0x7f0000000100)=ANY=[@ANYBLOB='btr\x00\x00.macroman']) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0xd13, 0x0, 0x0, 0x1, &(0x7f0000000140)={[{@resize='resize'}, {@resize='resize'}, {@discard_size={'discard', 0x3d, 0x7}}, {@discard_size={'discard', 0x3d, 0x200}}, {@iocharset={'iocharset', 0x3d, 'macroman'}}, {@resize_size={'resize', 0x3d, 0x400}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@euid_eq={'euid'}}]}) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x80140, 0x0) setsockopt$inet_tcp_TLS_RX(r1, 0x6, 0x2, &(0x7f0000000200), 0x4) mmap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x8, 0x2010, r1, 0x0) ioctl$KVM_ASSIGN_SET_MSIX_NR(r1, 0x4008ae73, &(0x7f0000000080)={0xac1, 0xb35}) 04:22:47 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x800e000000000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:47 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0xfffffffffffff000, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:47 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\xff', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 04:22:47 executing program 1 (fault-call:3 fault-nth:18): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) 04:22:47 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x5000000, 0x0) 04:22:47 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x13, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2421.911239][T12119] FAULT_INJECTION: forcing a failure. [ 2421.911239][T12119] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2421.924469][T12119] CPU: 1 PID: 12119 Comm: syz-executor1 Not tainted 5.0.0-rc2-next-20190115 #12 [ 2421.933485][T12119] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2421.943648][T12119] Call Trace: [ 2421.946946][T12119] dump_stack+0x1db/0x2d0 [ 2421.951288][T12119] ? dump_stack_print_info.cold+0x20/0x20 [ 2421.957016][T12119] ? console_unlock+0x876/0x1040 [ 2421.961962][T12119] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2421.967797][T12119] should_fail.cold+0xa/0x14 [ 2421.972394][T12119] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2421.978209][T12119] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2421.984449][T12119] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 2421.990174][T12119] ? debug_smp_processor_id+0x1c/0x20 [ 2421.995555][T12119] ? irq_work_queue+0x36/0x1d0 [ 2422.000330][T12119] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2422.006566][T12119] ? wake_up_klogd+0x11a/0x180 [ 2422.011338][T12119] should_fail_alloc_page+0x50/0x60 [ 2422.016537][T12119] __alloc_pages_nodemask+0x323/0xdc0 [ 2422.021917][T12119] ? __alloc_pages_slowpath+0x2c60/0x2c60 [ 2422.027660][T12119] ? ___might_sleep+0x1e7/0x310 [ 2422.032512][T12119] ? trace_hardirqs_off+0xb8/0x310 [ 2422.037633][T12119] cache_grow_begin+0x9c/0x8c0 [ 2422.042400][T12119] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2422.048653][T12119] ? check_preemption_disabled+0x48/0x290 [ 2422.054395][T12119] kmem_cache_alloc_trace+0x67f/0x760 [ 2422.059782][T12119] kobject_uevent_env+0x2fb/0x102b [ 2422.064908][T12119] ? resched_curr+0x1a0/0x1a0 [ 2422.069596][T12119] kobject_uevent+0x20/0x26 [ 2422.074104][T12119] lo_ioctl+0x11c6/0x23e0 [ 2422.078437][T12119] ? lo_rw_aio+0x1e50/0x1e50 [ 2422.083026][T12119] ? __fget+0x473/0x710 [ 2422.087185][T12119] ? lo_rw_aio+0x1e50/0x1e50 [ 2422.091781][T12119] blkdev_ioctl+0x10e0/0x2120 [ 2422.096465][T12119] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2422.102703][T12119] ? blkpg_ioctl+0xc10/0xc10 [ 2422.107298][T12119] ? lock_downgrade+0xbe0/0xbe0 [ 2422.112158][T12119] ? kasan_check_read+0x11/0x20 [ 2422.117012][T12119] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2422.122991][T12119] ? rcu_read_unlock_special+0x380/0x380 [ 2422.128631][T12119] ? __fget+0x49a/0x710 [ 2422.132799][T12119] block_ioctl+0xee/0x130 [ 2422.137130][T12119] ? blkdev_fallocate+0x410/0x410 [ 2422.142156][T12119] do_vfs_ioctl+0x107b/0x17d0 [ 2422.146850][T12119] ? putname+0xef/0x130 [ 2422.151006][T12119] ? ioctl_preallocate+0x2f0/0x2f0 [ 2422.156124][T12119] ? __fget_light+0x2db/0x420 [ 2422.160808][T12119] ? fget_raw+0x20/0x20 [ 2422.164976][T12119] ? do_sys_open+0x3f9/0x7c0 [ 2422.169569][T12119] ? do_syscall_64+0x8c/0x800 [ 2422.174245][T12119] ? do_syscall_64+0x8c/0x800 [ 2422.178927][T12119] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2422.184215][T12119] ? security_file_ioctl+0x93/0xc0 [ 2422.189335][T12119] ksys_ioctl+0xab/0xd0 [ 2422.193496][T12119] __x64_sys_ioctl+0x73/0xb0 [ 2422.198092][T12119] do_syscall_64+0x1a3/0x800 [ 2422.202704][T12119] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2422.208341][T12119] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2422.214062][T12119] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2422.219620][T12119] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2422.225511][T12119] RIP: 0033:0x457d37 [ 2422.229409][T12119] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 cd b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2422.249018][T12119] RSP: 002b:00007f18dfc72a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 04:22:47 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x8035000000000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) [ 2422.257430][T12119] RAX: ffffffffffffffda RBX: 0000000020000690 RCX: 0000000000457d37 [ 2422.265400][T12119] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 2422.273373][T12119] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2422.281340][T12119] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 2422.289315][T12119] R13: 0000000000000000 R14: 00000000004db990 R15: 0000000000000004 04:22:48 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\xfc', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 04:22:48 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x6000000, 0x0) 04:22:48 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:48 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x8100000000000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) [ 2422.565065][T12125] JFS: Cannot determine volume size [ 2422.588959][T12125] JFS: Cannot determine volume size [ 2422.594241][T12125] jfs: Unrecognized mount option "fscontext=system_u" or missing value [ 2422.737629][T12131] JFS: Cannot determine volume size [ 2422.744871][T12131] JFS: Cannot determine volume size [ 2422.756239][T12131] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:22:48 executing program 0: 04:22:48 executing program 1 (fault-call:3 fault-nth:19): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) 04:22:48 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x86ddffff00000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:48 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\xfd', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 04:22:48 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x2, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:48 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x7000000, 0x0) 04:22:48 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\xf6', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 04:22:48 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x8847000000000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:48 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x3, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2422.991919][T12150] FAULT_INJECTION: forcing a failure. [ 2422.991919][T12150] name failslab, interval 1, probability 0, space 0, times 0 [ 2423.018326][T12150] CPU: 0 PID: 12150 Comm: syz-executor1 Not tainted 5.0.0-rc2-next-20190115 #12 [ 2423.027392][T12150] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2423.037457][T12150] Call Trace: [ 2423.040772][T12150] dump_stack+0x1db/0x2d0 [ 2423.045116][T12150] ? dump_stack_print_info.cold+0x20/0x20 [ 2423.050858][T12150] should_fail.cold+0xa/0x14 [ 2423.055461][T12150] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2423.061281][T12150] ? ___might_sleep+0x1e7/0x310 [ 2423.066133][T12150] ? arch_local_save_flags+0x50/0x50 [ 2423.071424][T12150] ? retint_kernel+0x2d/0x2d [ 2423.076021][T12150] __should_failslab+0x121/0x190 [ 2423.080962][T12150] should_failslab+0x9/0x14 [ 2423.085468][T12150] kmem_cache_alloc_node+0x265/0x710 [ 2423.090752][T12150] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2423.097004][T12150] __alloc_skb+0xf4/0x730 [ 2423.101338][T12150] ? skb_trim+0x190/0x190 [ 2423.105676][T12150] ? netlink_has_listeners+0x2e7/0x4a0 [ 2423.111136][T12150] ? netlink_tap_init_net+0x3e0/0x3e0 [ 2423.116513][T12150] alloc_uevent_skb+0x83/0x1e2 [ 2423.121287][T12150] kobject_uevent_env+0xa63/0x102b [ 2423.126413][T12150] kobject_uevent+0x20/0x26 [ 2423.130920][T12150] lo_ioctl+0x11c6/0x23e0 [ 2423.135265][T12150] ? lo_rw_aio+0x1e50/0x1e50 [ 2423.139857][T12150] ? blkdev_ioctl+0xbf/0x2120 [ 2423.144530][T12150] ? lo_rw_aio+0x1e50/0x1e50 [ 2423.149122][T12150] blkdev_ioctl+0x10e0/0x2120 [ 2423.153800][T12150] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2423.160036][T12150] ? blkpg_ioctl+0xc10/0xc10 [ 2423.164632][T12150] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2423.169917][T12150] ? retint_kernel+0x2d/0x2d [ 2423.174511][T12150] ? trace_hardirqs_on_caller+0xc0/0x310 [ 2423.180143][T12150] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2423.185609][T12150] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 2423.191778][T12150] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2423.197258][T12150] block_ioctl+0xee/0x130 [ 2423.201594][T12150] ? blkdev_fallocate+0x410/0x410 [ 2423.206623][T12150] do_vfs_ioctl+0x107b/0x17d0 [ 2423.211326][T12150] ? ioctl_preallocate+0x2f0/0x2f0 [ 2423.216441][T12150] ? __fget_light+0x2db/0x420 [ 2423.221130][T12150] ? fget_raw+0x20/0x20 [ 2423.225290][T12150] ? do_sys_open+0x3f9/0x7c0 [ 2423.229882][T12150] ? do_syscall_64+0x8c/0x800 [ 2423.234562][T12150] ? do_syscall_64+0x8c/0x800 [ 2423.239250][T12150] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2423.244543][T12150] ? security_file_ioctl+0x93/0xc0 [ 2423.249657][T12150] ksys_ioctl+0xab/0xd0 [ 2423.253814][T12150] __x64_sys_ioctl+0x73/0xb0 [ 2423.258410][T12150] do_syscall_64+0x1a3/0x800 [ 2423.263005][T12150] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2423.268639][T12150] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2423.274366][T12150] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2423.279921][T12150] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2423.285807][T12150] RIP: 0033:0x457d37 [ 2423.289701][T12150] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 cd b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2423.309302][T12150] RSP: 002b:00007f18dfc72a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2423.317716][T12150] RAX: ffffffffffffffda RBX: 0000000020000690 RCX: 0000000000457d37 [ 2423.325687][T12150] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 2423.333653][T12150] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 04:22:48 executing program 0: r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x3, 0x2) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000001700)={[{@resize='resize'}, {@resize='resize'}, {@resize_size={'resize'}}, {@discard_size={'discard', 0x3d, 0x200}}, {@iocharset={'iocharset', 0x3d, 'macroman'}}, {@resize_size={'resize', 0x3d, 0x400}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@euid_eq={'euid'}}]}) ioctl$SNDRV_CTL_IOCTL_PCM_INFO(r0, 0xc1205531, &(0x7f0000000100)={0x2, 0x7, 0x5, 0xffffffff, [], [], [], 0x8001, 0x1a57, 0x1fffe0000, 0x7, "135d4793566d5e0c8610424f2c48ff2a"}) [ 2423.341621][T12150] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 2423.349592][T12150] R13: 0000000000000000 R14: 00000000004db990 R15: 0000000000000004 04:22:49 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x6, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:49 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x8848000000000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) [ 2423.510410][T12162] JFS: Cannot determine volume size 04:22:49 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x8000000, 0x0) [ 2423.554007][T12162] JFS: Cannot determine volume size 04:22:49 executing program 1 (fault-call:3 fault-nth:20): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) 04:22:49 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\xfe', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 04:22:49 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x7, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:49 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x8864000000000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) [ 2423.593475][T12162] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:22:49 executing program 0: prctl$PR_GET_KEEPCAPS(0x7) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000001700)=ANY=[@ANYBLOB="726573697a652c726573697a652c726573697a653d3078303030303030303030303030303030302c646973636172643d3078303030303030303030303030303230302c696f636861727365a378b26963726f6d616e2c726573697a653d3078303030303030303030303030303430302c6673636f6e746578743d73797374656d5f752c657569643d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 04:22:49 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x8, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2423.736170][T12177] FAULT_INJECTION: forcing a failure. [ 2423.736170][T12177] name failslab, interval 1, probability 0, space 0, times 0 [ 2423.759118][T12177] CPU: 1 PID: 12177 Comm: syz-executor1 Not tainted 5.0.0-rc2-next-20190115 #12 [ 2423.768191][T12177] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2423.778250][T12177] Call Trace: [ 2423.781550][T12177] dump_stack+0x1db/0x2d0 [ 2423.785887][T12177] ? dump_stack_print_info.cold+0x20/0x20 [ 2423.791616][T12177] ? should_fail+0x31b/0xd13 [ 2423.796220][T12177] should_fail.cold+0xa/0x14 [ 2423.801148][T12177] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2423.806972][T12177] ? ___might_sleep+0x1e7/0x310 [ 2423.811824][T12177] ? arch_local_save_flags+0x50/0x50 [ 2423.817119][T12177] __should_failslab+0x121/0x190 [ 2423.822061][T12177] should_failslab+0x9/0x14 [ 2423.826588][T12177] kmem_cache_alloc_node+0x265/0x710 [ 2423.831878][T12177] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2423.838117][T12177] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2423.843576][T12177] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 2423.849740][T12177] __alloc_skb+0xf4/0x730 [ 2423.854081][T12177] ? skb_trim+0x190/0x190 [ 2423.858419][T12177] ? retint_kernel+0x2d/0x2d [ 2423.863022][T12177] alloc_uevent_skb+0x83/0x1e2 [ 2423.867798][T12177] kobject_uevent_env+0xa63/0x102b [ 2423.872935][T12177] kobject_uevent+0x20/0x26 [ 2423.877437][T12177] lo_ioctl+0x11c6/0x23e0 [ 2423.881770][T12177] ? lo_rw_aio+0x1e50/0x1e50 [ 2423.886373][T12177] ? __fget+0x473/0x710 [ 2423.890525][T12177] ? lo_rw_aio+0x1e50/0x1e50 [ 2423.895133][T12177] blkdev_ioctl+0x10e0/0x2120 [ 2423.899813][T12177] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2423.906056][T12177] ? blkpg_ioctl+0xc10/0xc10 [ 2423.910769][T12177] ? lock_downgrade+0xbe0/0xbe0 [ 2423.915620][T12177] ? kasan_check_read+0x11/0x20 [ 2423.920470][T12177] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2423.926456][T12177] ? rcu_read_unlock_special+0x380/0x380 [ 2423.932103][T12177] ? __fget+0x49a/0x710 [ 2423.936271][T12177] block_ioctl+0xee/0x130 [ 2423.940616][T12177] ? blkdev_fallocate+0x410/0x410 [ 2423.945637][T12177] do_vfs_ioctl+0x107b/0x17d0 [ 2423.950314][T12177] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 2423.956475][T12177] ? ioctl_preallocate+0x2f0/0x2f0 [ 2423.961589][T12177] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2423.967568][T12177] ? retint_kernel+0x2d/0x2d [ 2423.972203][T12177] ksys_ioctl+0xab/0xd0 [ 2423.976367][T12177] __x64_sys_ioctl+0x73/0xb0 [ 2423.980965][T12177] do_syscall_64+0x1a3/0x800 [ 2423.985558][T12177] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2423.991198][T12177] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2423.996924][T12177] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2424.002478][T12177] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2424.008363][T12177] RIP: 0033:0x457d37 [ 2424.012261][T12177] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 cd b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 04:22:49 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x03', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 04:22:49 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x88a8ffff00000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) [ 2424.031859][T12177] RSP: 002b:00007f18dfc72a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2424.040272][T12177] RAX: ffffffffffffffda RBX: 0000000020000690 RCX: 0000000000457d37 [ 2424.048242][T12177] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 2424.056209][T12177] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2424.064179][T12177] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 2424.072146][T12177] R13: 0000000000000000 R14: 00000000004db990 R15: 0000000000000004 [ 2424.126072][T12184] JFS: Cannot determine volume size 04:22:49 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0xd, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:49 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x9000000, 0x0) [ 2424.159009][T12184] JFS: Cannot determine volume size [ 2424.178957][T12184] jfs: Unrecognized mount option "iocharse£x²icroman" or missing value 04:22:49 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x88caffff00000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:49 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x10, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:49 executing program 1 (fault-call:3 fault-nth:21): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) 04:22:49 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 04:22:49 executing program 0: syz_mount_image$jfs(&(0x7f0000000200)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x8, 0x0, 0x0, 0x1, &(0x7f0000001700)=ANY=[@ANYBLOB="726573697a652c726573697a652c726573697a653d3078303030303030303030303030303030302c646973636172643d3078303030303030303030303030303230302c696f636861727365743d6d6163726f6d616e2c726573697a653d3078303030303030303030303030303430302c6673636f6e7465783133582f6c8f99bf6812ec7a7c8ed474", @ANYPTR64=&(0x7f0000000100)=ANY=[@ANYRES32, @ANYBLOB="fb6dcf9e5dee971748a9cd415f38ffd1ec4bcd8e219ad08d6255c1a24af7eab36d0917939cd833ed03d3d8a1d811e2531b49b9e837f0376fed8ff2d2f55afe71c4b8bf5e4ab80d2418b9d1fa094b09a3daeff63602360711e672e05e5d3a4e69c0dd2867a217fa72137a4ca7a7317cb801052db3105749e6f5cf6f614d59b5b48a48b9f809140ea4a247f970e5ba6656dc806badb09cdf6c54cb9d9271f878", @ANYPTR64, @ANYRESHEX, @ANYRES16, @ANYRESHEX=0x0, @ANYPTR64=&(0x7f0000000080)=ANY=[@ANYRESHEX=0x0, @ANYRES64, @ANYRES64, @ANYRESHEX], @ANYRES16, @ANYRESHEX], @ANYBLOB=',\x00']) 04:22:49 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x8906000000000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:49 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x14, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2424.499666][T12203] FAULT_INJECTION: forcing a failure. [ 2424.499666][T12203] name failslab, interval 1, probability 0, space 0, times 0 [ 2424.519380][T12203] CPU: 0 PID: 12203 Comm: syz-executor1 Not tainted 5.0.0-rc2-next-20190115 #12 [ 2424.528542][T12203] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2424.538607][T12203] Call Trace: [ 2424.541911][T12203] dump_stack+0x1db/0x2d0 04:22:50 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xa000000, 0x0) [ 2424.546258][T12203] ? dump_stack_print_info.cold+0x20/0x20 [ 2424.552002][T12203] ? save_stack+0x45/0xd0 [ 2424.556335][T12203] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2424.562146][T12203] ? kasan_slab_alloc+0xf/0x20 [ 2424.566917][T12203] ? kmem_cache_alloc_node+0x144/0x710 [ 2424.572384][T12203] ? __alloc_skb+0xf4/0x730 [ 2424.576892][T12203] ? kobject_uevent_env+0xa63/0x102b [ 2424.582186][T12203] should_fail.cold+0xa/0x14 [ 2424.586786][T12203] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2424.592604][T12203] ? ___might_sleep+0x1e7/0x310 [ 2424.597476][T12203] ? arch_local_save_flags+0x50/0x50 [ 2424.602773][T12203] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2424.609016][T12203] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2424.615374][T12203] __should_failslab+0x121/0x190 [ 2424.620316][T12203] should_failslab+0x9/0x14 [ 2424.624924][T12203] kmem_cache_alloc_node_trace+0x270/0x720 [ 2424.630739][T12203] ? __alloc_skb+0xf4/0x730 [ 2424.635256][T12203] __kmalloc_node_track_caller+0x3d/0x70 [ 2424.640890][T12203] __kmalloc_reserve.isra.0+0x40/0xe0 [ 2424.646265][T12203] __alloc_skb+0x12d/0x730 [ 2424.650690][T12203] ? skb_trim+0x190/0x190 [ 2424.655046][T12203] ? netlink_has_listeners+0x2e7/0x4a0 [ 2424.660514][T12203] ? netlink_tap_init_net+0x3e0/0x3e0 [ 2424.665890][T12203] alloc_uevent_skb+0x83/0x1e2 [ 2424.670663][T12203] kobject_uevent_env+0xa63/0x102b [ 2424.675779][T12203] ? resched_curr+0x1a0/0x1a0 [ 2424.680470][T12203] kobject_uevent+0x20/0x26 [ 2424.684984][T12203] lo_ioctl+0x11c6/0x23e0 [ 2424.689320][T12203] ? lo_rw_aio+0x1e50/0x1e50 [ 2424.693916][T12203] ? __fget+0x473/0x710 [ 2424.698075][T12203] ? lo_rw_aio+0x1e50/0x1e50 [ 2424.702678][T12203] blkdev_ioctl+0x10e0/0x2120 [ 2424.707359][T12203] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2424.713625][T12203] ? blkpg_ioctl+0xc10/0xc10 [ 2424.718329][T12203] ? lock_downgrade+0xbe0/0xbe0 [ 2424.723183][T12203] ? kasan_check_read+0x11/0x20 [ 2424.728034][T12203] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2424.734018][T12203] ? rcu_read_unlock_special+0x380/0x380 [ 2424.739665][T12203] ? __fget+0x49a/0x710 [ 2424.743834][T12203] block_ioctl+0xee/0x130 [ 2424.748165][T12203] ? blkdev_fallocate+0x410/0x410 [ 2424.753194][T12203] do_vfs_ioctl+0x107b/0x17d0 [ 2424.757875][T12203] ? putname+0xef/0x130 [ 2424.762032][T12203] ? ioctl_preallocate+0x2f0/0x2f0 [ 2424.767147][T12203] ? __fget_light+0x2db/0x420 [ 2424.771934][T12203] ? fget_raw+0x20/0x20 [ 2424.776098][T12203] ? do_sys_open+0x3f9/0x7c0 [ 2424.780695][T12203] ? do_syscall_64+0x8c/0x800 [ 2424.785393][T12203] ? do_syscall_64+0x8c/0x800 [ 2424.790074][T12203] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2424.795370][T12203] ? security_file_ioctl+0x93/0xc0 [ 2424.800489][T12203] ksys_ioctl+0xab/0xd0 [ 2424.804653][T12203] __x64_sys_ioctl+0x73/0xb0 [ 2424.809248][T12203] do_syscall_64+0x1a3/0x800 [ 2424.813862][T12203] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2424.819497][T12203] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2424.825220][T12203] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2424.830776][T12203] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2424.836662][T12203] RIP: 0033:0x457d37 [ 2424.840561][T12203] Code: 48 83 c4 08 48 89 d8 5b 5d c3 66 0f 1f 84 00 00 00 00 00 48 89 e8 48 f7 d8 48 39 c3 0f 92 c0 eb 92 66 90 b8 10 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 cd b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2424.860161][T12203] RSP: 002b:00007f18dfc72a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 2424.868575][T12203] RAX: ffffffffffffffda RBX: 0000000020000690 RCX: 0000000000457d37 [ 2424.876543][T12203] RDX: 0000000000000005 RSI: 0000000000004c00 RDI: 0000000000000006 [ 2424.884517][T12203] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2424.892575][T12203] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 04:22:50 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0xfeffffff00000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) [ 2424.900548][T12203] R13: 0000000000000000 R14: 00000000004db990 R15: 0000000000000004 [ 2424.925494][T12207] JFS: Cannot determine volume size [ 2424.950007][T12207] JFS: Cannot determine volume size 04:22:50 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x28, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:50 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 04:22:50 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0xfffffffffffff000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) [ 2424.977683][T12207] jfs: Unrecognized mount option "fscontex13X/l™¿hìz|ŽÔt" or missing value 04:22:50 executing program 1 (fault-call:3 fault-nth:22): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) 04:22:50 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0xffffffffffffffff}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:50 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0xf0, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2425.082171][T12207] JFS: Cannot determine volume size [ 2425.088608][T12207] JFS: Cannot determine volume size [ 2425.101053][T12207] jfs: Unrecognized mount option "fscontex13X/l™¿hìz|ŽÔt" or missing value 04:22:50 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 2425.189317][T12230] FAULT_INJECTION: forcing a failure. [ 2425.189317][T12230] name failslab, interval 1, probability 0, space 0, times 0 [ 2425.215184][T12230] CPU: 1 PID: 12230 Comm: syz-executor1 Not tainted 5.0.0-rc2-next-20190115 #12 [ 2425.224236][T12230] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2425.234299][T12230] Call Trace: [ 2425.237601][T12230] dump_stack+0x1db/0x2d0 [ 2425.241970][T12230] ? dump_stack_print_info.cold+0x20/0x20 [ 2425.247696][T12230] ? lock_downgrade+0xbe0/0xbe0 [ 2425.252553][T12230] ? kasan_check_read+0x11/0x20 [ 2425.257408][T12230] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2425.263397][T12230] should_fail.cold+0xa/0x14 [ 2425.267995][T12230] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2425.273804][T12230] ? ___might_sleep+0x1e7/0x310 [ 2425.278653][T12230] ? arch_local_save_flags+0x50/0x50 [ 2425.283969][T12230] __should_failslab+0x121/0x190 [ 2425.288907][T12230] should_failslab+0x9/0x14 [ 2425.293418][T12230] kmem_cache_alloc+0x2be/0x710 [ 2425.298280][T12230] ? __fget_light+0x2db/0x420 [ 2425.302967][T12230] getname_flags+0xd6/0x5b0 [ 2425.307471][T12230] do_mkdirat+0xba/0x2f0 [ 2425.311712][T12230] ? __ia32_sys_mknod+0xb0/0xb0 [ 2425.316562][T12230] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2425.322729][T12230] ? trace_hardirqs_off_caller+0x300/0x300 [ 2425.328539][T12230] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2425.334001][T12230] __x64_sys_mkdir+0x5c/0x80 [ 2425.338593][T12230] do_syscall_64+0x1a3/0x800 [ 2425.343184][T12230] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2425.348817][T12230] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2425.354543][T12230] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2425.360104][T12230] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2425.365997][T12230] RIP: 0033:0x4572e7 [ 2425.369905][T12230] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 3d c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 1d c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 04:22:50 executing program 0: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/autofs\x00', 0x1, 0x0) ioctl$TCGETA(r0, 0x5405, &(0x7f0000000080)) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000001700)={[{@resize='resize'}, {@resize='resize'}, {@resize_size={'resize'}}, {@discard_size={'discard', 0x3d, 0x200}}, {@iocharset={'iocharset', 0x3d, 'macroman'}}, {@resize_size={'resize', 0x3d, 0x400}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@euid_eq={'euid'}}]}) 04:22:50 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x300, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:50 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x2}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) [ 2425.389508][T12230] RSP: 002b:00007f18dfc72a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2425.397930][T12230] RAX: ffffffffffffffda RBX: 0000000020000690 RCX: 00000000004572e7 [ 2425.405899][T12230] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000380 [ 2425.413877][T12230] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2425.421851][T12230] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 2425.429818][T12230] R13: 0000000000000000 R14: 00000000004db990 R15: 0000000000000004 04:22:51 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x10000000, 0x0) 04:22:51 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x543, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:51 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 04:22:51 executing program 1 (fault-call:3 fault-nth:23): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) 04:22:51 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x3}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:51 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x600, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2425.690267][T12244] JFS: Cannot determine volume size [ 2425.716985][T12244] JFS: Cannot determine volume size 04:22:51 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x190f0000, 0x0) 04:22:51 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x4}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) [ 2425.737549][T12244] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:22:51 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x608, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2425.809453][T12256] FAULT_INJECTION: forcing a failure. [ 2425.809453][T12256] name failslab, interval 1, probability 0, space 0, times 0 [ 2425.831336][T12256] CPU: 1 PID: 12256 Comm: syz-executor1 Not tainted 5.0.0-rc2-next-20190115 #12 [ 2425.840391][T12256] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2425.840398][T12256] Call Trace: [ 2425.840425][T12256] dump_stack+0x1db/0x2d0 [ 2425.840445][T12256] ? dump_stack_print_info.cold+0x20/0x20 [ 2425.840464][T12256] ? lock_downgrade+0xbe0/0xbe0 [ 2425.840481][T12256] ? kasan_check_read+0x11/0x20 [ 2425.840498][T12256] ? rcu_dynticks_curr_cpu_in_eqs+0xa2/0x170 [ 2425.840520][T12256] should_fail.cold+0xa/0x14 [ 2425.840539][T12256] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2425.840560][T12256] ? ___might_sleep+0x1e7/0x310 [ 2425.840575][T12256] ? arch_local_save_flags+0x50/0x50 [ 2425.840598][T12256] __should_failslab+0x121/0x190 [ 2425.858253][T12256] should_failslab+0x9/0x14 [ 2425.858276][T12256] kmem_cache_alloc+0x2be/0x710 [ 2425.868809][T12256] ? __fget_light+0x2db/0x420 [ 2425.868830][T12256] getname_flags+0xd6/0x5b0 [ 2425.868849][T12256] do_mkdirat+0xba/0x2f0 [ 2425.868867][T12256] ? __ia32_sys_mknod+0xb0/0xb0 [ 2425.868888][T12256] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2425.868909][T12256] ? trace_hardirqs_off_caller+0x300/0x300 [ 2425.890057][T12256] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2425.890081][T12256] __x64_sys_mkdir+0x5c/0x80 [ 2425.890103][T12256] do_syscall_64+0x1a3/0x800 [ 2425.959339][T12256] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2425.964979][T12256] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2425.971229][T12256] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2425.976783][T12256] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2425.982668][T12256] RIP: 0033:0x4572e7 [ 2425.986562][T12256] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 3d c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 1d c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2426.006173][T12256] RSP: 002b:00007f18dfc72a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2426.014587][T12256] RAX: ffffffffffffffda RBX: 0000000020000690 RCX: 00000000004572e7 [ 2426.022559][T12256] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000380 [ 2426.030537][T12256] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2426.038506][T12256] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 2426.046473][T12256] R13: 0000000000000000 R14: 00000000004db990 R15: 0000000000000004 [ 2426.090105][T12259] JFS: Cannot determine volume size [ 2426.101400][T12259] JFS: Cannot determine volume size [ 2426.119255][T12259] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:22:51 executing program 0: lsetxattr$trusted_overlay_origin(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.origin\x00', &(0x7f0000000100)='y\x00', 0x2, 0x2) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000001700)={[{@resize='resize'}, {@resize='resize'}, {@resize_size={'resize'}}, {@discard_size={'discard', 0x3d, 0x200}}, {@iocharset={'iocharset', 0x3d, 'macroman'}}, {@resize_size={'resize', 0x3d, 0x400}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@euid_eq={'euid'}}]}) 04:22:51 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x6}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:51 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x689, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:51 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 04:22:51 executing program 1 (fault-call:3 fault-nth:24): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) 04:22:51 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x700, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:51 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1f000000, 0x0) 04:22:51 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x7}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) [ 2426.392663][T12278] JFS: Cannot determine volume size [ 2426.406991][T12276] FAULT_INJECTION: forcing a failure. [ 2426.406991][T12276] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2426.407963][T12278] JFS: Cannot determine volume size [ 2426.420211][T12276] CPU: 0 PID: 12276 Comm: syz-executor1 Not tainted 5.0.0-rc2-next-20190115 #12 [ 2426.420222][T12276] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2426.420226][T12276] Call Trace: [ 2426.420251][T12276] dump_stack+0x1db/0x2d0 [ 2426.420271][T12276] ? dump_stack_print_info.cold+0x20/0x20 [ 2426.420316][T12276] should_fail.cold+0xa/0x14 [ 2426.420352][T12276] ? retint_kernel+0x2d/0x2d [ 2426.438979][T12278] jfs: Unrecognized mount option "fscontext=system_u" or missing value [ 2426.444673][T12276] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2426.444690][T12276] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 2426.444717][T12276] ? trace_hardirqs_on_thunk+0x1a/0x1c 04:22:52 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 2426.492870][T12276] should_fail_alloc_page+0x50/0x60 [ 2426.498071][T12276] __alloc_pages_nodemask+0x323/0xdc0 [ 2426.503462][T12276] ? __alloc_pages_slowpath+0x2c60/0x2c60 [ 2426.509328][T12276] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2426.515594][T12276] ? ___might_sleep+0x1e7/0x310 [ 2426.520452][T12276] ? trace_hardirqs_off+0xb8/0x310 [ 2426.525597][T12276] cache_grow_begin+0x9c/0x8c0 [ 2426.530373][T12276] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2426.536621][T12276] ? check_preemption_disabled+0x48/0x290 04:22:52 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x806, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2426.536648][T12276] kmem_cache_alloc+0x645/0x710 [ 2426.536678][T12276] getname_flags+0xd6/0x5b0 [ 2426.551706][T12276] do_mkdirat+0xba/0x2f0 [ 2426.555969][T12276] ? __ia32_sys_mknod+0xb0/0xb0 [ 2426.560827][T12276] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2426.567006][T12276] ? trace_hardirqs_off_caller+0x300/0x300 [ 2426.572819][T12276] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2426.578284][T12276] __x64_sys_mkdir+0x5c/0x80 [ 2426.582875][T12276] do_syscall_64+0x1a3/0x800 [ 2426.582896][T12276] ? syscall_return_slowpath+0x5f0/0x5f0 04:22:52 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x8}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) [ 2426.582915][T12276] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2426.582936][T12276] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2426.582971][T12276] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2426.610358][T12276] RIP: 0033:0x4572e7 [ 2426.614256][T12276] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 3d c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 1d c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2426.633857][T12276] RSP: 002b:00007f18dfc72a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2426.642272][T12276] RAX: ffffffffffffffda RBX: 0000000020000690 RCX: 00000000004572e7 [ 2426.650239][T12276] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000380 [ 2426.658212][T12276] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2426.666288][T12276] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 2426.674259][T12276] R13: 0000000000000000 R14: 00000000004db990 R15: 0000000000000004 04:22:52 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000001700)={[{@resize='resize'}, {@resize='resize'}, {@resize_size={'resize'}}, {@discard_size={'discard', 0x3d, 0x200}}, {@iocharset={'iocharset', 0x3d, 'macroman'}}, {@resize_size={'resize', 0x3d, 0x400}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@euid_eq={'euid'}}]}) r0 = socket$isdn(0x22, 0x3, 0x37) ioctl$sock_proto_private(r0, 0x89e6, &(0x7f0000000040)="78c0374662c342a7d9fedf29133b6e3c79d5e00106048f9151951e3f4d73a47a5c54cdc3a50309fb8765c9f22e526c032cfd9d5f316f4a9ad77b") getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffff9c, 0x29, 0x22, &(0x7f00000014c0)={{{@in6=@loopback, @in=@empty, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@local}}, &(0x7f00000015c0)=0xe8) syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000100)='./file0/file0\x00', 0x400000008000000, 0x6, &(0x7f0000001400)=[{&(0x7f0000000140)="d4d92c2f9bdfe2c9167ed5e5852d27e2dd77fe595da19c27c517a6b6dd26829efd8adc587d69fce27d8ff9fe6467c3895fb3332ce1b17011eae800ba60e8db26222ea436e82f21cd8185b00b051cb31193b35f8734f42e53b9f34e3e1dfa9cc7e8eed0675d5d07832436b8e8349eda06a76045f58ecd365e1db02caadaef762f50d71f365f333c2f081350fcf0b05776902560b19aeda210422e40ecf3d21154c183230888ba94a49e03361357405af00f97b730ab9fd6d4ae2b33c3b866d9317741129d1c3f5b47939ea8096fa06a18f1090ddf6af53310ceed1ff25779a4f0c77fd83e18fbee5fd4134dfe35257b4af1473ad2e997649d845e1bc0b009d7b18147d3802f6365df5b6ac93c5e2ce1cfb5bf8d9a39b2737fa24a6bd8b85dce00f3c0cb1aa31689d318fc869345cff877f8fcfba0103dc7479a8bb412b83662cdd468570d1cd8e87347f1fae62c41463960709865141097c3e57cf7c38551c35a43106c608c62a83eab02da440e8d5bea219ea35ab01756119833db5a302d0fbfc10db62176fa7ae7fbfd1c81767881e727c9ed8b03c2a9b99fa0c2a5636229dcb91943d63180a714e4f9dbe4f452ef691bb2a05c8a58792c7595d1eb97dc74f19facff12e0fb88fdcb8c1538b287be1bcc6c625a04fe116c429e0a9606e204c151088c4f1a4bb52e844bf79df04ef395bd62a9864cab57a269a06b63548800b3bf0cbc1516c1ea59d8fc1f530612cd1a595a46b2a9439fd41bd53faa3d653170610654abd9872617f9fe9e399c5d60d8fb7a26950dd169f6d744fa23f3763e4311cf77c36651d38f4a1292f0a80a7eaace694dede4da9981af21fb6526b2ff1a128da03344f6daad41ba617df0ad33a1d24169c90128896d5551b8b76a902b5974fdf621c4adf9d3a1923140c2f3b76f73f43a98d3e60c65cffbb77d6a529ea316cb00d5ba25902b3e50acc7c11674bd8f18a178cb60d461073238f9df911ad857eb1afeba92dc9e632e7d068a71e31c52e5a28edf1759a6adf737f02728b60ff3eba2c28e412d1a7f929afa465e5895e6b2b9273cbd5cf75dc538ea6f02a3b418e16b3141e14ff5a69fb4c3a4ae780f4a773c67b4ec9599850cc0d7b9df44445c6bf762f2058a3372c4deae4aa87d227a6ee6bfa10c97f50519f0f6b2414e2857d3b83e90fb313d0a25422f486ec0308a4ca2605bcbee58ee66d243fa7fbbfff2a2ea7d514ab9f5eb785e5a920781b4da9f27d9e6b7757cf7ad9319dabfad27619d5c0ce08bfca26adce5fd87630824556f9e075e8cf4945f55a4ea7624c08cd7ca025770bb5a5357cae2e4bfb08bff14ae3014e651e975a7361432188571b7cdfb782dda739e7f63e27746863a7b3c76fa46ca1510a374d13e88ad349a30a429090619895afe54a3c979ad68a910ded9e177a68538fbcdba4137fe5d703a11af2a88eba7e4d140f039a92d3d5f6bbe67b93df68aba0dc58a788b4b9f19a018bc49891d623de960259a44725f78fb10b0bec6fc610371cdd17d5be4904f69cf2b07bd000a563b1c40fcb6e145a6d60b8b015a05e9e89e9ade758896b749217f3d4661b9224625c7550dbad956c7991559385494c1f11ed5ca2b229cbfc378e3bb2f4b01600dcf6f7a96e62f773b97a9a2883269de4981d4e664ffd874c5a61af4cd330558321c3fa6f1454cf4f4cf8ff525b8e631093c0975522f0996becb9e8db4e1750bc0ff2b2f08b305df4c2744f937c57a5664e0f4d01c99e1d7b294ef3a6c1c0b770fe44507037f4ba1eb09a39964a1d90095bfce505a47e300074d27a9d9b632cc1563391d6608f915d22dc92950a3544b7b45d973283289be5837c2aa81b8f888665971f3087e15bd8235f2fd5fd86935bce396585d8b6c9b1687effb5381543e8e1df0606c78a142e9e45081e52efabe664e98e179e726e3e85aeeedf6339be639dd453a92382d4530596bf779ae16a5b7dfaad315e473b89a0cf580519b46994b24919aa8da6d443de6f252a1eeed0ef702d4886b8d9970c563ef7d5bc6c36510878bf92994484635f63166972e8fd0478a0aa6793540cbb0f4c131e0a20a31eafe2882d3acc1101872a53eb48dc72d813df7d9c2228ec48d7489e15643a50553074bd0b51a2044dfd6e95fd8737a976ca3439aabedf56f6277e16e9cbb12945ae91799333e06948b0661d5daee9d84b58b0a6f3198217f878afbc5a27e7ec7eafaa9bbea6fb8c43994adbdf04bcd082cdb2bb07cb6b2afee275ffb047861c434108660d20bf316acf461d073f9078c395cd831986bd5127dfa937a0ad0d6df90a73fd28ba624854ea6c2a82becbd56f4fe67bdc6ded846e54915b5809711538f180545188844ecb4aabcb4464efc4a0a19f60ef58d6bbcad0c11f90fa2f944491343d03f4cd23f46d1eff1d760b0ab04ab650182c04c9168b43378c75050d5f50edf1760538b0765c54df9867463fb50c0c953a46f6c8588fb2dd58ab5eed4fcf1b78dc0f29ac95c37161114bf22ee8727edafd08e8ee6ebfacbb693ddcbacb3ab4a34e0f7e2ea3ef26d062783ed1bd1635e69c93cd4c45f2a9416b650fa5e83e1ba122336786ea6cb84328a1dd5e3a8dfcbc555cc466a5828ce19d9fbc3dcec71e22e2fc7589eb892c1c49ddd78f7840261e0a8b50bfb63d39e3a87a5c51def73793f3a9180a8404624e41d5e1b5224691a680414647cbd11504360237524af66f2703bdb9b5b7cd747758deacdce36267063d184245a74a3a60f359b8c8b68fa79628696cf54a1fd8ef6280a606093e2f5bcb8662fba9a35bfe5247247e98849e6f83aaf057dead3abad26def507b5a0e1f4fcd40c25135b459f94cd0daf1fe15a712e12b4a96b7b4dcfc377c4e5d6d17a231a59625f2d4cb471d7d82532751221174419d5c3dc1c6062e522ae1236be52c46a20c392deff244da931b4d81afae531168b4cec37056848a47e7e7b9b7bba7d34b1fb06e22fadda762f2228eaf4b081df751026414188a78c54932f80300c8e1c2536ba1699005d80af72d2e09b9b941faf499702c5a9782924297ba8f9e3abd85b1108333b0cc7639b26064dcd2405d7bdd89d116acf418e2e2ca100da166e26ee8a8a82dcd34beeefae01debd87426ec49ad04ed57319093c27c6e7412c11cd5ca94d4f357899c6ffe9f007d2b48063dceb7e605cdeead2e2c83be8f006acd612f6eac600892c443831851fbbe6f97c40c0c0d0d00f8ced901817c815f04ffe99cf61b67d755d71bdbc0df91aa2b970ec99a9311d3d8bd2888329dedb14a4d790ab3d78109428b235f8a42016d5b217f52828582cf9abc10d2c0498e34e8aa18210d5e865daf2fe92537a6d53097a6fcf7b583df841c199991da950d7a3800f6e5cfc210cf81c85570047dbca65ec85fe1075ad84a027e16dcb44363e0464d0f373a9c196db5fc92382ad5c630c06e151c9b7d4b76e96e4387ecfe5189379d11e2830c6e083a83c520b1913e30946357e8d431c44a0702967e733033f9d2ff879c0fda4ec10fbbfcf591739608066a34e05e993741996f8e2510e59223ab994c759a88fb1a03e0e470778a1da604287726e73c20d761717110668ab901eb77ea09a346477e045277a1b8012427877e6ceed705f44739e67d11d4ff0eed65a1fa0a734dff00262fe19710c72c4d34e54dc0d951124bdbb06a83dad44020bd187231b3b849dcc8e78cfbc4ce6f2557c9c552b7c5035349d6ac278294ce77623d4d22fa9a4f26a1899becb93bc72eee89ae4313919816fdd3e336a37052d8ecf0d4991ef75d1d149599546e53f1b701bef1de0abae2ade7fde479f1d2917e041b8dd57ace78192e4c6076168c3959a73efe24569714f8810fdd0828b491f71256c6c39a3dc1ca2201f9c39c7ce9fd4bdde4110c2c34d65391fe94a02111d0b59c2b5563825a03b7c311ee89fdc7e2712766c656b135ef22f6d3be90752b848873012fcf14f96596407c612e52532d38c7c1971e90ad891ea824f4003c13f5445d38f1b3ca5d7dd3a9d51c22421a46e39370b1e0891bddbd544c75459fd7870aa614ac7d4969a5102f4372e5d682bfb881247e4ec0c932ab91f90e78562d74253156bb7e1f9c692a55b26d07144eea1e6106e7c60c6e27e3ca01de8aa6ed016c6784522aa49ada9221336d88a4edbe0a6c53572e91b6e7c9356869adec98da6129d00f2c811881ddd1131c20c7032915010333595a428432b7de3b1b2406716a9e14bde66766a6b0d68fe185e55ae0cf7247ce1e6277d44838eeae07006d304a4b152ebd2589ead2f5ca297a7651e23edaa8c6c2af0933620b5b0eecdb770f8f8309f9c2b4b96072f817854fdeb5bfe7d05bd551835f00682cbeef91625c362cb053c1716d51ad350b9dc677a6342a5f894d978afb0bf6ed61def601c475c5e030190b4aeb931fcea1d4c3ff6345dbaf71ccfbe8ae10cb26914fba0d9ee86e27a28ad7c4863ecd851343b11fac7db4e282203db17266d64fa777875c0601a49c086b8a25b51c9457c5512295a6e421e6aa286db33ce0669b0cb50e41d8c59ad67cae071f687e7fcf56313d381d11e0a4268c97c43fe452687a08a5b0ef3e75666223fdcda880f41dcea49776d242f4fb08e1284f7e7e548a941d2361d8ce47e1941b56b56b8f9c69e19d4d01f8b77eef4c191fe99fc371e8c76fbbfc0be455fdbcb023854ac8278fc271619b16352e3e8da76080e7bd3a704ff03039e1d5c816aea3e613235d810261e05b6c7b6f980400d16feda643b53f23a03de78976f9b68adeb119e4fec3c9ff4068e3d9a6e6ed46f66fbc70cab606925075391ae7ce5eb0a19c00e203b71b92f27e0c50bc1135f939a968721f4d75aa0753ed2391b2121b73e3f81ef04a8014c399d9765cf5480cca5c034192d9e8a43aa6c26d3dfec80b56a5a71ce20085ee8f9ae4d4888e1bfafaecd7d89b1a11c864a98355813721fae20ab760990eb81ae70fb9ffd95cd67d49fa0a2bd064be2fad3f3e63e3af6c8f5b0bdcea591085be0195c84f96c8a434eb39f87c5358d1d24b4b39aad318a8cf4b45a0f221a1430bd390830f35096700f0198dd7cefaef5e0d8c85a1879fcc434b9dc7f79e6e10f021862594d2954a5e7cb2488af7a5c9e11ff75bc9aba9e3193f8e85678116ab095d1ab4396bb5d45f41a160231860df150e2d446ad93679e740c92475e14dbe2e279043eedacfaeaa95f32f6fe26bd3da7293d06886e8c189baab16ca1f445903608efa214de14b5fb30edf0405ddac6f1ad55e4f3c3d25610815379661617bbd682a0a0848ed7094f73f43c7e80891c5988d29cd42a030a6c2cf7306a6202d65797446011a63c95228a37d2e46e8b62fa24315cba4756541f77faf26b0282a1f4242d62285da4994ed0e48bd40f42d3acc536e9dda6d45424bfaa266fc22af030f73585b8b774f35571f7585549a2b5ba1848fc1749b6b8afebdb20ecbecc993f5846ed8a68298ad7b8b0c465c19023e13836ee3dcb43955b5221dd8276197573e21f013489ae60c39191e58e979de1ac55926989f69729472c6ec285a98334086a943798907b41147d1b0d1a0619dbe6e518229b6f17e4280a9168ce0e4ddc425df1f30008ae9a2f9a8415a7f5e77f9415808711b047c1a00cce3ddd7cfdcfcc7feaf053619842bc0c486025c6803cc329144f1d6a7ae1220f811477f039b8433a4dde5de78996a503b3182541bda34b95697d7c32c8f3d3620b26d68d70d79c97bb962b0fc722f9dfac141f0a8cc64c614b014115dd5903a942b2acdd6d", 0x1000, 0x4}, {&(0x7f0000001140)="668403f13d34d711deb13bc92d8d982bd7221301e801e940ca5026b6b84591e5b08b584f8e982738a0c66c333e842780301e3b948655556d1d713c3ebd2f5bc80e9249fad9e71210933d2a267ccc33bf15a3151da0b4ffa2c75b1ab48585b91f66a62ae009ebb1339f640dd0c4acb09455affaf1fc95f3fc151cf3483f654bef14feb04d9340e32aad5fdbb81a8bae9e39429218f0fd2611a57c513f5817426ff53bdbb60f00c3ea6e4db2a0c59883ba000c4f4e53a77400a962b6c76802fc", 0xbf, 0x4}, {&(0x7f0000001200)="3b352de0e28140d54cea002541566f550d6bd1f4ab3b377e5c90e7c324c1534b84b0536184f17caf5afe65d8a34c59122a37c56248ed02cf8f181e2ccdf8e5c13235f9c7b29ff7e6aa75c9d2b1fb22a896dae73548802a3e34d5c0faac4bd3cc6f74a3c5745712728ce73ad0035242f99ba9d995ea9a9567e1cc197fef1f20", 0x7f, 0x5}, {&(0x7f0000001280)="289bd52f1d3252f32049a93c00c4355fab3584a8b26b140c76f6fda258817462b19dce70d816910500f6a97dcddfbc53be4f15da1f2c68abb56156831ff75529367d308e857051d22a15b6fca02041fab94f155dfffcd324fd7e94c4f252d1e3a8e20dd9983d684a7894aa471f76b846d75e28", 0x73, 0x8}, {&(0x7f0000001300)="ad8edc8f48cee9037113fc7d2dd1bdd48e8911703ed37540defb842fbfc66b164af5eb66092cc2492ea35188d0f3fe31c881801fe06fe2cf10f24121e4ecac7fd9aa73898c5d3c1f3909f9413c4f0d5db16bee3d01007e54ce340c6ed5641447e9547d32cbb2fda671fcc9945db8", 0x6e, 0x2}, {&(0x7f0000001380)="30ee3e82540a33b0af666104276f25f6359bd77dbe261c2831d1cc38d2c20e2549f29b5a3bb421248f27f85a88ed3c8e63ed44615bcac56dfd0e5f36c8f27e382ca842837ffc30661f9e272e49443912fbd8e5cf45f95ac1ef010bcf74", 0x5d, 0x2}], 0x8, &(0x7f0000001600)={[{@nointegrity='nointegrity'}, {@noquota='noquota'}, {@usrquota='usrquota'}, {@integrity='integrity'}, {@nodiscard='nodiscard'}], [{@fowner_eq={'fowner', 0x3d, r1}}]}) 04:22:52 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0xd00, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:52 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0xd}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:52 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 04:22:52 executing program 1 (fault-call:3 fault-nth:25): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) 04:22:52 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0xe80, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2426.973855][T12299] JFS: Cannot determine volume size 04:22:52 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20000000, 0x0) 04:22:52 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x10}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) [ 2427.000990][T12299] JFS: Cannot determine volume size [ 2427.017558][T12299] jfs: Unrecognized mount option "fscontext=system_u" or missing value [ 2427.051068][T12306] FAULT_INJECTION: forcing a failure. [ 2427.051068][T12306] name failslab, interval 1, probability 0, space 0, times 0 [ 2427.063873][T12306] CPU: 1 PID: 12306 Comm: syz-executor1 Not tainted 5.0.0-rc2-next-20190115 #12 [ 2427.072892][T12306] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2427.082959][T12306] Call Trace: [ 2427.086263][T12306] dump_stack+0x1db/0x2d0 [ 2427.090606][T12306] ? dump_stack_print_info.cold+0x20/0x20 [ 2427.096320][T12306] ? __lock_acquire+0x572/0x4a10 [ 2427.101264][T12306] should_fail.cold+0xa/0x14 [ 2427.105857][T12306] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2427.111656][T12306] ? mark_held_locks+0x100/0x100 [ 2427.111669][T12306] ? print_usage_bug+0xd0/0xd0 [ 2427.111694][T12306] ? finish_task_switch+0x1e9/0xac0 [ 2427.111717][T12306] ? mark_held_locks+0xb1/0x100 [ 2427.111741][T12306] __should_failslab+0x121/0x190 [ 2427.111765][T12306] should_failslab+0x9/0x14 [ 2427.121431][T12306] kmem_cache_alloc+0x47/0x710 [ 2427.121450][T12306] ? __es_remove_extent+0x871/0xb30 [ 2427.121476][T12306] __es_insert_extent+0x366/0x1190 [ 2427.121500][T12306] ? ext4_es_free_extent+0x770/0x770 [ 2427.121521][T12306] ? do_raw_read_unlock+0x70/0x70 [ 2427.131520][T12306] ? __lock_is_held+0xb6/0x140 [ 2427.131553][T12306] ext4_es_insert_extent+0x369/0xc80 [ 2427.131580][T12306] ? ext4_es_scan_clu+0x50/0x50 [ 2427.131597][T12306] ? ext4_es_init_tree+0x70/0x70 [ 2427.131619][T12306] ? retint_kernel+0x1b/0x2d [ 2427.131636][T12306] ? trace_hardirqs_on_caller+0x310/0x310 [ 2427.131662][T12306] ext4_ext_put_gap_in_cache+0x176/0x200 [ 2427.141051][T12306] ? ext4_rereserve_cluster+0x240/0x240 [ 2427.141070][T12306] ? retint_kernel+0x2d/0x2d [ 2427.141102][T12306] ext4_ext_map_blocks+0x2ab8/0x60a0 [ 2427.141119][T12306] ? __ext4_journal_get_write_access+0x70/0xa0 [ 2427.141150][T12306] ? ext4_ext_release+0x10/0x10 [ 2427.141167][T12306] ? check_preemption_disabled+0x48/0x290 [ 2427.141186][T12306] ? __lock_is_held+0xb6/0x140 [ 2427.238992][T12306] ? lock_acquire+0x1db/0x570 [ 2427.243670][T12306] ? ext4_map_blocks+0x46f/0x1b90 [ 2427.248694][T12306] ? ___might_sleep+0x1e7/0x310 [ 2427.253546][T12306] ? lock_release+0xc40/0xc40 [ 2427.258228][T12306] ? ext4_es_lookup_extent+0x478/0xdd0 [ 2427.263700][T12306] ? down_read+0x8d/0x120 [ 2427.268031][T12306] ? ext4_map_blocks+0x46f/0x1b90 [ 2427.273061][T12306] ? __down_interruptible+0x740/0x740 [ 2427.278442][T12306] ext4_map_blocks+0xf80/0x1b90 [ 2427.283292][T12306] ? unwind_get_return_address+0x61/0xa0 [ 2427.288934][T12306] ? ext4_issue_zeroout+0x190/0x190 [ 2427.294144][T12306] ext4_getblk+0x11b/0x610 [ 2427.298561][T12306] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2427.304626][T12306] ? ext4_iomap_begin+0x1430/0x1430 [ 2427.309830][T12306] ? do_raw_spin_unlock+0xa0/0x330 [ 2427.314957][T12306] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2427.321199][T12306] ? __dquot_initialize+0x632/0xda0 [ 2427.326401][T12306] ? d_instantiate_anon+0x30/0x30 [ 2427.331430][T12306] ext4_bread+0x8d/0x2b0 [ 2427.335676][T12306] ? ext4_getblk+0x610/0x610 [ 2427.340268][T12306] ? check_preemption_disabled+0x48/0x290 [ 2427.345986][T12306] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 2427.351624][T12306] ext4_append+0x150/0x370 [ 2427.356043][T12306] ext4_mkdir+0x6b1/0xef0 [ 2427.360382][T12306] ? ext4_init_dot_dotdot+0x520/0x520 [ 2427.365752][T12306] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2427.371994][T12306] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2427.378235][T12306] ? security_inode_permission+0xd5/0x110 [ 2427.383958][T12306] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2427.390215][T12306] ? security_inode_mkdir+0xee/0x120 [ 2427.395506][T12306] vfs_mkdir+0x433/0x690 [ 2427.399755][T12306] do_mkdirat+0x271/0x2f0 [ 2427.404104][T12306] ? __ia32_sys_mknod+0xb0/0xb0 [ 2427.408956][T12306] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2427.415024][T12306] ? trace_hardirqs_off_caller+0x300/0x300 [ 2427.420948][T12306] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2427.426409][T12306] __x64_sys_mkdir+0x5c/0x80 [ 2427.431003][T12306] do_syscall_64+0x1a3/0x800 [ 2427.435592][T12306] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2427.441220][T12306] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2427.446960][T12306] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2427.452517][T12306] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2427.458407][T12306] RIP: 0033:0x4572e7 [ 2427.462323][T12306] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 3d c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 1d c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2427.481923][T12306] RSP: 002b:00007f18dfc72a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2427.490350][T12306] RAX: ffffffffffffffda RBX: 0000000020000690 RCX: 00000000004572e7 04:22:53 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 04:22:53 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x1400, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2427.498319][T12306] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000380 [ 2427.506298][T12306] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2427.514262][T12306] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 2427.522228][T12306] R13: 0000000000000000 R14: 00000000004db990 R15: 0000000000000004 04:22:53 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x11}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) [ 2427.596459][T12299] JFS: Cannot determine volume size [ 2427.629787][T12299] JFS: Cannot determine volume size [ 2427.635142][T12299] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:22:53 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x14}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:53 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f00000001c0)=ANY=[@ANYBLOB='resize,resize,resize=0x0000000000000000,discard=0x0000000000000200,iocharset=macroman,resize=0x0000000000000400,fscontext=system_u,euid=', @ANYRESDEC=0x0, @ANYBLOB="f45f38388e2d3a9742ce4892de4cd0bf42d6cb3fce594dc545ba22b3bb48296d02315a3659c0ed55b004f65bad40d032d9df483ce72cad8009c19198c989b812f8052bef9cebf3150ef20302329975ae1c2f"]) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000180)='/dev/rtc0\x00', 0xfffffffffffffffc, 0x0) renameat(r0, &(0x7f0000000040)='./file0\x00', r0, &(0x7f0000000080)='./file0\x00') 04:22:53 executing program 1 (fault-call:3 fault-nth:26): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) 04:22:53 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x2000, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:53 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20100000, 0x0) 04:22:53 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x1c}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:53 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) [ 2427.846574][T12326] FAULT_INJECTION: forcing a failure. [ 2427.846574][T12326] name failslab, interval 1, probability 0, space 0, times 0 [ 2427.885280][T12334] JFS: Cannot determine volume size [ 2427.893681][T12326] CPU: 1 PID: 12326 Comm: syz-executor1 Not tainted 5.0.0-rc2-next-20190115 #12 [ 2427.902745][T12326] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2427.912811][T12326] Call Trace: [ 2427.915107][T12334] JFS: Cannot determine volume size [ 2427.916113][T12326] dump_stack+0x1db/0x2d0 [ 2427.925671][T12326] ? dump_stack_print_info.cold+0x20/0x20 [ 2427.931400][T12326] ? path_init+0x1ef0/0x1ef0 [ 2427.936015][T12326] should_fail.cold+0xa/0x14 [ 2427.937131][T12334] jfs: Unrecognized mount option "fscontext=system_u" or missing value [ 2427.940617][T12326] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2427.940643][T12326] ? ___might_sleep+0x1e7/0x310 [ 2427.940659][T12326] ? arch_local_save_flags+0x50/0x50 [ 2427.940684][T12326] __should_failslab+0x121/0x190 [ 2427.940703][T12326] should_failslab+0x9/0x14 [ 2427.940730][T12326] kmem_cache_alloc+0x2be/0x710 [ 2427.979672][T12326] __d_alloc+0xae/0xbe0 [ 2427.983833][T12326] ? d_lookup+0x163/0x360 [ 2427.988172][T12326] ? shrink_dcache_for_umount+0x2b0/0x2b0 [ 2427.993895][T12326] ? d_alloc_parallel+0x1f10/0x1f10 [ 2427.999098][T12326] ? trace_hardirqs_on+0xbd/0x310 [ 2428.004124][T12326] ? lookup_dcache+0x23/0x140 [ 2428.008806][T12326] ? trace_hardirqs_off_caller+0x300/0x300 [ 2428.014611][T12326] ? lock_acquire+0x1db/0x570 [ 2428.019292][T12326] ? filename_create+0x1a8/0x5a0 [ 2428.024231][T12326] ? ___might_sleep+0x1e7/0x310 [ 2428.029109][T12326] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 2428.034855][T12326] d_alloc+0x99/0x420 [ 2428.038840][T12326] ? __d_lookup+0x960/0x960 [ 2428.043348][T12326] ? __d_alloc+0xbe0/0xbe0 [ 2428.047774][T12326] __lookup_hash+0xcd/0x190 [ 2428.052278][T12326] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2428.058522][T12326] filename_create+0x1d6/0x5a0 [ 2428.063297][T12326] ? kern_path_mountpoint+0x40/0x40 [ 2428.068502][T12326] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2428.074744][T12326] ? getname_flags+0x277/0x5b0 [ 2428.079510][T12326] do_mkdirat+0xcf/0x2f0 [ 2428.083755][T12326] ? __ia32_sys_mknod+0xb0/0xb0 [ 2428.088783][T12326] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2428.095024][T12326] ? trace_hardirqs_off_caller+0x300/0x300 [ 2428.100833][T12326] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2428.106322][T12326] __x64_sys_mkdir+0x5c/0x80 [ 2428.110917][T12326] do_syscall_64+0x1a3/0x800 [ 2428.115511][T12326] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2428.121159][T12326] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2428.126891][T12326] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2428.132447][T12326] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2428.138357][T12326] RIP: 0033:0x4572e7 [ 2428.142253][T12326] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 3d c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 1d c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2428.161861][T12326] RSP: 002b:00007f18dfc72a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2428.170285][T12326] RAX: ffffffffffffffda RBX: 0000000020000690 RCX: 00000000004572e7 [ 2428.178254][T12326] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000380 [ 2428.186225][T12326] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a 04:22:53 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x2800, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2428.194198][T12326] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 2428.202167][T12326] R13: 0000000000000000 R14: 00000000004db990 R15: 0000000000000004 04:22:53 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x60}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:53 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x3580, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:53 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x23000000, 0x0) [ 2428.278252][T12334] JFS: Cannot determine volume size [ 2428.289595][T12334] JFS: Cannot determine volume size [ 2428.310769][T12334] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:22:53 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 04:22:53 executing program 1 (fault-call:3 fault-nth:27): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) 04:22:53 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000001700)={[], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@euid_eq={'euid'}}]}) 04:22:53 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0xf0}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:53 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x3f00, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:54 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 04:22:54 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x300}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:54 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x4000, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:54 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 04:22:54 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x3f000000, 0x0) [ 2428.621710][T12365] jfs: Unrecognized mount option "fscontext=system_u" or missing value [ 2428.632328][T12358] FAULT_INJECTION: forcing a failure. [ 2428.632328][T12358] name failslab, interval 1, probability 0, space 0, times 0 04:22:54 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x4305, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2428.688434][T12358] CPU: 1 PID: 12358 Comm: syz-executor1 Not tainted 5.0.0-rc2-next-20190115 #12 [ 2428.697494][T12358] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2428.707548][T12358] Call Trace: [ 2428.710852][T12358] dump_stack+0x1db/0x2d0 [ 2428.715188][T12358] ? dump_stack_print_info.cold+0x20/0x20 [ 2428.720913][T12358] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2428.726204][T12358] ? retint_kernel+0x2d/0x2d [ 2428.730811][T12358] ? trace_hardirqs_on_caller+0xc0/0x310 [ 2428.736457][T12358] should_fail.cold+0xa/0x14 [ 2428.741056][T12358] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2428.746875][T12358] ? ___might_sleep+0x1e7/0x310 [ 2428.751741][T12358] ? arch_local_save_flags+0x50/0x50 [ 2428.757043][T12358] __should_failslab+0x121/0x190 [ 2428.761985][T12358] should_failslab+0x9/0x14 [ 2428.766488][T12358] __kmalloc+0x2dc/0x740 [ 2428.770739][T12358] ? ext4_find_extent+0x76e/0x9d0 [ 2428.775766][T12358] ext4_find_extent+0x76e/0x9d0 [ 2428.780639][T12358] ext4_ext_map_blocks+0x261/0x60a0 [ 2428.785845][T12358] ? retint_kernel+0x2d/0x2d [ 2428.790436][T12358] ? trace_hardirqs_on_caller+0xc0/0x310 [ 2428.796072][T12358] ? print_usage_bug+0xd0/0xd0 [ 2428.800851][T12358] ? ext4_ext_release+0x10/0x10 [ 2428.805709][T12358] ? __lock_is_held+0xb6/0x140 [ 2428.810481][T12358] ? lock_acquire+0x1db/0x570 [ 2428.815157][T12358] ? ext4_map_blocks+0x922/0x1b90 [ 2428.820184][T12358] ? ___might_sleep+0x1e7/0x310 [ 2428.825037][T12358] ? lock_release+0xc40/0xc40 [ 2428.829730][T12358] ? down_write+0x8a/0x130 [ 2428.834145][T12358] ? ext4_map_blocks+0x922/0x1b90 [ 2428.839174][T12358] ? down_read+0x120/0x120 [ 2428.843596][T12358] ? ext4_map_blocks+0x8dc/0x1b90 [ 2428.848643][T12358] ext4_map_blocks+0x98a/0x1b90 [ 2428.853536][T12358] ? ext4_issue_zeroout+0x190/0x190 [ 2428.858736][T12358] ? print_usage_bug+0xd0/0xd0 [ 2428.863507][T12358] ? mark_held_locks+0xb1/0x100 [ 2428.868367][T12358] ext4_getblk+0x11b/0x610 [ 2428.872797][T12358] ? retint_kernel+0x2d/0x2d [ 2428.877392][T12358] ? ext4_iomap_begin+0x1430/0x1430 [ 2428.882597][T12358] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2428.888842][T12358] ? __dquot_initialize+0x632/0xda0 [ 2428.894047][T12358] ext4_bread+0x8d/0x2b0 [ 2428.898294][T12358] ? ext4_getblk+0x610/0x610 [ 2428.902907][T12358] ? retint_kernel+0x2d/0x2d [ 2428.907507][T12358] ext4_append+0x150/0x370 [ 2428.911927][T12358] ext4_mkdir+0x6b1/0xef0 [ 2428.916282][T12358] ? ext4_init_dot_dotdot+0x520/0x520 [ 2428.921673][T12358] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2428.927912][T12358] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2428.934154][T12358] ? security_inode_permission+0xd5/0x110 [ 2428.939873][T12358] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2428.946111][T12358] ? security_inode_mkdir+0xee/0x120 [ 2428.951417][T12358] vfs_mkdir+0x433/0x690 [ 2428.955669][T12358] do_mkdirat+0x271/0x2f0 [ 2428.960001][T12358] ? __ia32_sys_mknod+0xb0/0xb0 [ 2428.964856][T12358] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2428.970925][T12358] ? trace_hardirqs_off_caller+0x300/0x300 [ 2428.976856][T12358] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2428.982320][T12358] __x64_sys_mkdir+0x5c/0x80 [ 2428.986912][T12358] do_syscall_64+0x1a3/0x800 [ 2428.991642][T12358] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2428.997278][T12358] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2429.003004][T12358] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2429.008566][T12358] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2429.014454][T12358] RIP: 0033:0x4572e7 [ 2429.018347][T12358] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 3d c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 1d c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 04:22:54 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x543}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:54 executing program 0: r0 = syz_open_dev$swradio(&(0x7f00000000c0)='/dev/swradio#\x00', 0x0, 0x2) ioctl$KVM_GET_CPUID2(r0, 0xc008ae91, &(0x7f0000000240)={0x7, 0x0, [{}, {}, {}, {}, {}, {}, {}]}) removexattr(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)=@known='com.apple.FinderInfo\x00') syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000740)=ANY=[@ANYRESOCT, @ANYRESDEC=0x0, @ANYRESHEX]) syz_mount_image$reiserfs(&(0x7f0000000100)='reiserfs\x00', &(0x7f0000000140)='./file1\x00', 0xdb, 0x5, &(0x7f00000005c0)=[{&(0x7f0000000180)="5256304c5ffe87e190e154e2cc77dbcc213f14a9f03a7e09119a2d899b3b0c5216", 0x21, 0x13f}, {&(0x7f00000001c0)="6ca36ff06f9b752c71fed11d93e4ca318e2112507489e8ba5e131ee2b6b32f83eb24", 0x22, 0x3}, {&(0x7f0000000380)="218933f100afea091d60412ed5647080e077d806ee1a4bae8339661f6474c3fa086a75849602e984ceeb67639dd3183754a8608602122fefa19e92f816c117fa77b7cf0af03166469628eccf3c6358ea9c4d5c6d6c06a4c8b7cbc8e6f112519f49a3e547628f3833fc13d66aa3e8afcfb69e81f22e85154351b47728489a8ab046c65f1380b9ade2", 0x88, 0x8}, {&(0x7f0000000440)="20f8ae137d2e0efb1c11055a2be8dc2b70ec575fe1d71b1ef41698bb9077e3035862cc04dc45c9d7c284f488dac6b49a350584ddb52170d516fd03470d8cc8477a3301390e7a492e4f091d4836a30a758850ce6223756a116bfe82bbc12fdd4cf7b0cc2a6b5829845341dc", 0x6b, 0xffff}, {&(0x7f00000004c0)="d00b64347946d19ef04cc3760cc508b6e17209717ba2e7eafa41ce6a9b6f7c63cb1bfc0c4fb0b5d2dbcd80a4600b2c79daa1dc3aa75610a99e1f55753a5076fed79743dcadc37b2cf9cf60604c243507ce8e984ba0189e071ba4e5c6129c851244e74e510a6bc80af4b750c08060ad155809ee039bad2322469595dcfb6576349613bfefece3cb920c97008fc283205171dc9e218c8ad2121de8f9d173830b592b20eaf652f09cc05924f6e08f34654fc360cdf2e891b6f4e577598b77da41e115188bf82f199f36ccfb15f9ec1456e6242cd9e4732039b0ce8623ce77df", 0xde, 0x3}], 0x2000, &(0x7f0000000780)=ANY=[@ANYBLOB="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"]) [ 2429.037949][T12358] RSP: 002b:00007f18dfc72a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2429.046359][T12358] RAX: ffffffffffffffda RBX: 0000000020000690 RCX: 00000000004572e7 [ 2429.054328][T12358] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000380 [ 2429.062296][T12358] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2429.070265][T12358] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 2429.078237][T12358] R13: 0000000000000000 R14: 00000000004db990 R15: 0000000000000004 04:22:54 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x4788, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:54 executing program 1 (fault-call:3 fault-nth:28): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) 04:22:54 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 04:22:54 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x600}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:54 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x4888, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2429.247227][T12379] jfs: Unrecognized mount option "01777777777777777777777000000000000000000000xffffffffffffffff" or missing value 04:22:54 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x608}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:54 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 04:22:54 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x40000000, 0x0) [ 2429.413099][T12391] FAULT_INJECTION: forcing a failure. [ 2429.413099][T12391] name failslab, interval 1, probability 0, space 0, times 0 [ 2429.466317][T12379] jfs: Unrecognized mount option "01777777777777777777777000000000000000000000xffffffffffffffff" or missing value [ 2429.487373][T12391] CPU: 1 PID: 12391 Comm: syz-executor1 Not tainted 5.0.0-rc2-next-20190115 #12 [ 2429.496435][T12391] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2429.506489][T12391] Call Trace: [ 2429.509780][T12391] dump_stack+0x1db/0x2d0 [ 2429.509798][T12391] ? dump_stack_print_info.cold+0x20/0x20 [ 2429.509824][T12391] should_fail.cold+0xa/0x14 [ 2429.509843][T12391] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2429.530240][T12391] ? ___might_sleep+0x1e7/0x310 [ 2429.535091][T12391] ? arch_local_save_flags+0x50/0x50 [ 2429.540388][T12391] __should_failslab+0x121/0x190 [ 2429.545331][T12391] should_failslab+0x9/0x14 [ 2429.549838][T12391] __kmalloc+0x2dc/0x740 [ 2429.554087][T12391] ? ext4_find_extent+0x76e/0x9d0 [ 2429.559113][T12391] ext4_find_extent+0x76e/0x9d0 [ 2429.563973][T12391] ext4_ext_map_blocks+0x261/0x60a0 [ 2429.569168][T12391] ? __ext4_journal_get_write_access+0x70/0xa0 [ 2429.575336][T12391] ? ext4_ext_release+0x10/0x10 [ 2429.580193][T12391] ? __lock_is_held+0xb6/0x140 [ 2429.584961][T12391] ? lock_acquire+0x1db/0x570 [ 2429.589638][T12391] ? ext4_map_blocks+0x922/0x1b90 [ 2429.594661][T12391] ? ___might_sleep+0x1e7/0x310 [ 2429.599514][T12391] ? lock_release+0xc40/0xc40 [ 2429.604193][T12391] ? ext4_es_lookup_extent+0x478/0xdd0 [ 2429.609667][T12391] ? down_write+0x8a/0x130 [ 2429.614085][T12391] ? ext4_map_blocks+0x922/0x1b90 [ 2429.619113][T12391] ? down_read+0x120/0x120 [ 2429.623542][T12391] ext4_map_blocks+0x98a/0x1b90 [ 2429.628400][T12391] ? ext4_issue_zeroout+0x190/0x190 [ 2429.633618][T12391] ext4_getblk+0x11b/0x610 [ 2429.638036][T12391] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2429.644104][T12391] ? ext4_iomap_begin+0x1430/0x1430 [ 2429.649311][T12391] ? do_raw_spin_unlock+0xa0/0x330 [ 2429.654441][T12391] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2429.660684][T12391] ? __dquot_initialize+0x632/0xda0 [ 2429.665891][T12391] ? d_instantiate_anon+0x30/0x30 [ 2429.670916][T12391] ext4_bread+0x8d/0x2b0 [ 2429.675160][T12391] ? ext4_getblk+0x610/0x610 [ 2429.679764][T12391] ? check_preemption_disabled+0x48/0x290 [ 2429.685487][T12391] ? debug_lockdep_rcu_enabled+0x71/0xa0 [ 2429.691126][T12391] ext4_append+0x150/0x370 [ 2429.695549][T12391] ext4_mkdir+0x6b1/0xef0 [ 2429.699897][T12391] ? ext4_init_dot_dotdot+0x520/0x520 [ 2429.705273][T12391] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2429.711511][T12391] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2429.717758][T12391] ? security_inode_permission+0xd5/0x110 [ 2429.723480][T12391] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2429.729729][T12391] ? security_inode_mkdir+0xee/0x120 [ 2429.735016][T12391] vfs_mkdir+0x433/0x690 [ 2429.739267][T12391] do_mkdirat+0x271/0x2f0 [ 2429.743605][T12391] ? __ia32_sys_mknod+0xb0/0xb0 [ 2429.748456][T12391] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2429.754545][T12391] ? trace_hardirqs_off_caller+0x300/0x300 [ 2429.760362][T12391] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2429.765824][T12391] __x64_sys_mkdir+0x5c/0x80 [ 2429.770415][T12391] do_syscall_64+0x1a3/0x800 [ 2429.775014][T12391] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2429.780648][T12391] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2429.786373][T12391] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2429.791936][T12391] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2429.797828][T12391] RIP: 0033:0x4572e7 [ 2429.802051][T12391] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 3d c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 1d c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2429.821656][T12391] RSP: 002b:00007f18dfc72a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2429.830084][T12391] RAX: ffffffffffffffda RBX: 0000000020000690 RCX: 00000000004572e7 [ 2429.838054][T12391] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000380 [ 2429.846021][T12391] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2429.853993][T12391] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 04:22:55 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x6488, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2429.861961][T12391] R13: 0000000000000000 R14: 00000000004db990 R15: 0000000000000004 04:22:55 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\xff', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 04:22:55 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x689}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:55 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x800e, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:55 executing program 1 (fault-call:3 fault-nth:29): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) 04:22:55 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000100)={[], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@euid_eq={'euid'}}]}) 04:22:55 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x8035, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:55 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x700}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:55 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, 0x0) 04:22:55 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x48000000, 0x0) 04:22:55 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x8100, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2430.238556][T12422] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:22:55 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x806}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:55 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x3, 0x0, 0x0, 0x0, 0x0) [ 2430.349181][T12420] FAULT_INJECTION: forcing a failure. [ 2430.349181][T12420] name failslab, interval 1, probability 0, space 0, times 0 [ 2430.374261][T12422] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:22:55 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x8847, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2430.395022][T12420] CPU: 0 PID: 12420 Comm: syz-executor1 Not tainted 5.0.0-rc2-next-20190115 #12 [ 2430.404083][T12420] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2430.414143][T12420] Call Trace: [ 2430.417453][T12420] dump_stack+0x1db/0x2d0 [ 2430.421803][T12420] ? dump_stack_print_info.cold+0x20/0x20 [ 2430.427543][T12420] should_fail.cold+0xa/0x14 [ 2430.432144][T12420] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2430.437963][T12420] ? ___might_sleep+0x1e7/0x310 [ 2430.442825][T12420] ? arch_local_save_flags+0x50/0x50 [ 2430.448126][T12420] __should_failslab+0x121/0x190 [ 2430.453070][T12420] should_failslab+0x9/0x14 [ 2430.457577][T12420] __kmalloc+0x2dc/0x740 [ 2430.461834][T12420] ? ext4_find_extent+0x76e/0x9d0 [ 2430.466862][T12420] ext4_find_extent+0x76e/0x9d0 [ 2430.471739][T12420] ext4_ext_map_blocks+0x261/0x60a0 [ 2430.476946][T12420] ? __ext4_journal_get_write_access+0x70/0xa0 [ 2430.483122][T12420] ? ext4_ext_release+0x10/0x10 [ 2430.487982][T12420] ? __lock_is_held+0xb6/0x140 [ 2430.492758][T12420] ? lock_acquire+0x1db/0x570 [ 2430.497436][T12420] ? ext4_map_blocks+0x922/0x1b90 [ 2430.502470][T12420] ? ___might_sleep+0x1e7/0x310 [ 2430.507329][T12420] ? lock_release+0xc40/0xc40 [ 2430.512014][T12420] ? ext4_es_lookup_extent+0x478/0xdd0 [ 2430.517504][T12420] ? down_write+0x8a/0x130 [ 2430.521925][T12420] ? ext4_map_blocks+0x922/0x1b90 [ 2430.526952][T12420] ? down_read+0x120/0x120 [ 2430.531382][T12420] ext4_map_blocks+0x98a/0x1b90 [ 2430.536249][T12420] ? ext4_issue_zeroout+0x190/0x190 [ 2430.541448][T12420] ? print_usage_bug+0xd0/0xd0 [ 2430.546318][T12420] ext4_getblk+0x11b/0x610 [ 2430.550744][T12420] ? ext4_iomap_begin+0x1430/0x1430 [ 2430.555956][T12420] ? print_usage_bug+0xd0/0xd0 [ 2430.560730][T12420] ? do_raw_spin_unlock+0xa0/0x330 [ 2430.565841][T12420] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2430.572092][T12420] ? __dquot_initialize+0x632/0xda0 [ 2430.577304][T12420] ext4_bread+0x8d/0x2b0 [ 2430.581551][T12420] ? ext4_getblk+0x610/0x610 [ 2430.586151][T12420] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2430.591451][T12420] ext4_append+0x150/0x370 [ 2430.595876][T12420] ext4_mkdir+0x6b1/0xef0 [ 2430.600224][T12420] ? ext4_init_dot_dotdot+0x520/0x520 [ 2430.605604][T12420] ? ext4_init_dot_dotdot+0x520/0x520 [ 2430.610986][T12420] vfs_mkdir+0x433/0x690 [ 2430.615266][T12420] do_mkdirat+0x271/0x2f0 [ 2430.619604][T12420] ? __ia32_sys_mknod+0xb0/0xb0 [ 2430.624493][T12420] __x64_sys_mkdir+0x5c/0x80 [ 2430.629095][T12420] do_syscall_64+0x1a3/0x800 [ 2430.633696][T12420] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2430.639339][T12420] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2430.645074][T12420] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2430.650669][T12420] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2430.656562][T12420] RIP: 0033:0x4572e7 [ 2430.660460][T12420] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 3d c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 1d c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2430.680066][T12420] RSP: 002b:00007f18dfc72a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2430.688507][T12420] RAX: ffffffffffffffda RBX: 0000000020000690 RCX: 00000000004572e7 04:22:56 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0xd00}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) [ 2430.696487][T12420] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000380 [ 2430.704463][T12420] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2430.712439][T12420] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 2430.720520][T12420] R13: 0000000000000000 R14: 00000000004db990 R15: 0000000000000004 04:22:56 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x8000000000001, &(0x7f0000001700)={[], [{@audit='audit'}, {@euid_eq={'euid'}}]}) 04:22:56 executing program 1 (fault-call:3 fault-nth:30): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) 04:22:56 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x8848, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:56 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x4c000000, 0x0) 04:22:56 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x4, 0x0, 0x0, 0x0, 0x0) 04:22:56 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0xe80}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:56 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x8864, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2431.092255][T12450] FAULT_INJECTION: forcing a failure. [ 2431.092255][T12450] name failslab, interval 1, probability 0, space 0, times 0 [ 2431.127905][T12450] CPU: 0 PID: 12450 Comm: syz-executor1 Not tainted 5.0.0-rc2-next-20190115 #12 [ 2431.136977][T12450] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2431.147047][T12450] Call Trace: [ 2431.147073][T12450] dump_stack+0x1db/0x2d0 [ 2431.147095][T12450] ? dump_stack_print_info.cold+0x20/0x20 [ 2431.160412][T12450] should_fail.cold+0xa/0x14 [ 2431.165025][T12450] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2431.170843][T12450] ? ___might_sleep+0x1e7/0x310 [ 2431.170860][T12450] ? arch_local_save_flags+0x50/0x50 [ 2431.170884][T12450] __should_failslab+0x121/0x190 [ 2431.170904][T12450] should_failslab+0x9/0x14 04:22:56 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x8906, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:56 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x1100}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) [ 2431.170920][T12450] kmem_cache_alloc+0x2be/0x710 [ 2431.170940][T12450] ? ext4_mb_new_blocks+0x43b/0x4850 [ 2431.170956][T12450] ext4_mb_new_blocks+0x6e8/0x4850 [ 2431.170995][T12450] ? ext4_discard_preallocations+0x1400/0x1400 [ 2431.190513][T12450] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2431.190532][T12450] ? print_usage_bug+0xd0/0xd0 [ 2431.190547][T12450] ? trace_hardirqs_on_caller+0xc0/0x310 [ 2431.190565][T12450] ? __switch_to_asm+0x40/0x70 [ 2431.190583][T12450] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2431.200699][T12450] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 2431.200722][T12450] ? mark_held_locks+0xb1/0x100 [ 2431.200741][T12450] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2431.200760][T12450] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2431.254411][T12450] ? retint_kernel+0x2d/0x2d [ 2431.264254][T12450] ? trace_hardirqs_on_caller+0xc0/0x310 [ 2431.269884][T12450] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2431.275356][T12450] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 2431.281522][T12450] ? lock_is_held_type+0x17e/0x210 [ 2431.286659][T12450] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2431.292125][T12450] ? retint_kernel+0x2d/0x2d [ 2431.296723][T12450] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2431.302961][T12450] ? ext4_inode_to_goal_block+0x2e9/0x400 [ 2431.302984][T12450] ext4_ext_map_blocks+0x36d0/0x60a0 [ 2431.303012][T12450] ? ext4_ext_release+0x10/0x10 [ 2431.303045][T12450] ? ___might_sleep+0x1e7/0x310 [ 2431.323708][T12450] ? lock_release+0xc40/0xc40 [ 2431.328401][T12450] ? ext4_es_lookup_extent+0x478/0xdd0 [ 2431.333889][T12450] ? down_write+0x8a/0x130 [ 2431.338323][T12450] ? ext4_map_blocks+0x922/0x1b90 04:22:56 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0xf000, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2431.343364][T12450] ? down_read+0x120/0x120 [ 2431.347799][T12450] ext4_map_blocks+0x98a/0x1b90 [ 2431.352661][T12450] ? ext4_issue_zeroout+0x190/0x190 [ 2431.357862][T12450] ? print_usage_bug+0xd0/0xd0 [ 2431.362649][T12450] ? mark_held_locks+0xb1/0x100 [ 2431.367519][T12450] ext4_getblk+0x11b/0x610 [ 2431.371945][T12450] ? retint_kernel+0x2d/0x2d [ 2431.376555][T12450] ? ext4_iomap_begin+0x1430/0x1430 [ 2431.381784][T12450] ? do_raw_spin_unlock+0xa0/0x330 [ 2431.386908][T12450] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 04:22:56 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x1400}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) [ 2431.393163][T12450] ? __dquot_initialize+0x632/0xda0 [ 2431.398373][T12450] ext4_bread+0x8d/0x2b0 [ 2431.402642][T12450] ? ext4_getblk+0x610/0x610 [ 2431.407245][T12450] ? retint_kernel+0x2d/0x2d [ 2431.411849][T12450] ext4_append+0x150/0x370 [ 2431.416272][T12450] ext4_mkdir+0x6b1/0xef0 [ 2431.420620][T12450] ? ext4_init_dot_dotdot+0x520/0x520 [ 2431.425989][T12450] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2431.432227][T12450] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2431.438472][T12450] ? security_inode_permission+0xd5/0x110 [ 2431.444195][T12450] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2431.450433][T12450] ? security_inode_mkdir+0xee/0x120 [ 2431.455722][T12450] vfs_mkdir+0x433/0x690 [ 2431.459973][T12450] do_mkdirat+0x271/0x2f0 [ 2431.464309][T12450] ? __ia32_sys_mknod+0xb0/0xb0 [ 2431.469167][T12450] __x64_sys_mkdir+0x5c/0x80 [ 2431.473763][T12450] do_syscall_64+0x1a3/0x800 [ 2431.478360][T12450] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2431.483993][T12450] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2431.489719][T12450] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2431.495278][T12450] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2431.501168][T12450] RIP: 0033:0x4572e7 [ 2431.505064][T12450] Code: 1f 40 00 b8 5a 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 3d c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 b8 53 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 1d c3 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2431.524668][T12450] RSP: 002b:00007f18dfc72a88 EFLAGS: 00000246 ORIG_RAX: 0000000000000053 [ 2431.533077][T12450] RAX: ffffffffffffffda RBX: 0000000020000690 RCX: 00000000004572e7 04:22:57 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x8, 0x0, 0x0, 0x0, 0x0) 04:22:57 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000001700)={[{@resize='resize'}, {@resize='resize'}, {@resize_size={'resize'}}, {@discard_size={'discard', 0x3d, 0x200}}, {@iocharset={'iocharset', 0x3d, 'macroman'}}, {@resize_size={'resize', 0x3d, 0x400}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@euid_eq={'euid'}}]}) prctl$PR_SET_TSC(0x1a, 0x0) r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x40, 0x0) inotify_add_watch(r0, &(0x7f0000000080)='./file0\x00', 0x1000640) [ 2431.541045][T12450] RDX: 0000000000000005 RSI: 00000000000001ff RDI: 0000000020000380 [ 2431.549016][T12450] RBP: 0000000000000000 R08: 0000000000000000 R09: 000000000000000a [ 2431.556984][T12450] R10: 0000000000000075 R11: 0000000000000246 R12: 0000000000000005 [ 2431.564956][T12450] R13: 0000000000000000 R14: 00000000004db990 R15: 0000000000000004 04:22:57 executing program 1 (fault-call:3 fault-nth:31): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) 04:22:57 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x68000000, 0x0) 04:22:57 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x1c00}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) [ 2431.694326][T12467] JFS: Cannot determine volume size 04:22:57 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0xf0ffff, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:57 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x300, 0x0, 0x0, 0x0, 0x0) [ 2431.759682][T12467] JFS: Cannot determine volume size [ 2431.765573][T12467] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:22:57 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x2000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:57 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x1000000, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2431.922530][T12467] JFS: Cannot determine volume size [ 2431.936984][T12467] JFS: Cannot determine volume size 04:22:57 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x6c000000, 0x0) 04:22:57 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x3f00, 0x0, 0x0, 0x0, 0x0) [ 2431.977356][T12478] FAULT_INJECTION: forcing a failure. [ 2431.977356][T12478] name failslab, interval 1, probability 0, space 0, times 0 [ 2431.989706][T12467] jfs: Unrecognized mount option "fscontext=system_u" or missing value [ 2431.990483][T12478] CPU: 0 PID: 12478 Comm: syz-executor1 Not tainted 5.0.0-rc2-next-20190115 #12 [ 2431.990531][T12478] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2432.017820][T12478] Call Trace: [ 2432.021126][T12478] dump_stack+0x1db/0x2d0 [ 2432.025474][T12478] ? dump_stack_print_info.cold+0x20/0x20 [ 2432.031211][T12478] should_fail.cold+0xa/0x14 [ 2432.035829][T12478] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2432.041644][T12478] ? __sigqueue_alloc+0x235/0x710 [ 2432.046675][T12478] ? find_held_lock+0x35/0x120 [ 2432.051449][T12478] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2432.057703][T12478] __should_failslab+0x121/0x190 [ 2432.062651][T12478] should_failslab+0x9/0x14 [ 2432.067160][T12478] kmem_cache_alloc+0x47/0x710 [ 2432.071946][T12478] __sigqueue_alloc+0x3ca/0x710 [ 2432.076804][T12478] ? dequeue_signal+0x6a0/0x6a0 [ 2432.081666][T12478] ? print_usage_bug+0xd0/0xd0 [ 2432.086454][T12478] ? __lock_acquire+0x572/0x4a10 [ 2432.091398][T12478] ? mark_held_locks+0x100/0x100 [ 2432.096343][T12478] __send_signal+0xdbb/0x1a10 [ 2432.101033][T12478] ? prepare_signal+0xe10/0xe10 [ 2432.105889][T12478] ? retint_kernel+0x2d/0x2d [ 2432.110490][T12478] ? lock_acquire+0x1db/0x570 [ 2432.115173][T12478] ? force_sig_info+0x55/0x310 [ 2432.119949][T12478] ? kasan_check_write+0x14/0x20 [ 2432.124897][T12478] ? do_raw_spin_lock+0x156/0x360 [ 2432.129933][T12478] ? lock_release+0xc40/0xc40 [ 2432.134622][T12478] ? rwlock_bug.part.0+0x90/0x90 [ 2432.139573][T12478] ? trace_hardirqs_on_caller+0x310/0x310 [ 2432.145303][T12478] send_signal+0x49/0xd0 [ 2432.149562][T12478] force_sig_info+0x251/0x310 [ 2432.154251][T12478] force_sig_fault+0x11b/0x180 [ 2432.159016][T12478] ? force_sigsegv+0x120/0x120 [ 2432.163798][T12478] ? kasan_check_write+0x14/0x20 [ 2432.168739][T12478] ? up_read+0x212/0x2b0 [ 2432.172995][T12478] __bad_area_nosemaphore+0x332/0x420 [ 2432.178379][T12478] bad_area+0x69/0x80 [ 2432.182373][T12478] __do_page_fault+0x996/0xda0 [ 2432.187138][T12478] ? __ia32_sys_mknod+0xb0/0xb0 [ 2432.191993][T12478] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2432.198072][T12478] do_page_fault+0xe6/0x7d8 [ 2432.202581][T12478] ? trace_hardirqs_on_caller+0xc0/0x310 [ 2432.208219][T12478] ? vmalloc_sync_all+0x30/0x30 [ 2432.213077][T12478] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 2432.219239][T12478] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2432.224880][T12478] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2432.231133][T12478] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2432.236855][T12478] ? page_fault+0x8/0x30 [ 2432.241116][T12478] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2432.246672][T12478] ? page_fault+0x8/0x30 [ 2432.250919][T12478] page_fault+0x1e/0x30 [ 2432.255073][T12478] RIP: 0033:0x451b7f [ 2432.258967][T12478] Code: bc d1 f3 0f 7f 27 f3 0f 7f 6f 10 f3 0f 7f 77 20 f3 0f 7f 7f 30 49 83 c0 0f 49 29 d0 48 8d 7c 17 31 e9 95 0b 00 00 66 0f ef c0 0f 6f 0e f3 0f 6f 56 10 66 0f 74 c1 66 0f d7 d0 49 83 f8 11 0f 04:22:57 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x2000000, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:57 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x3580}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) [ 2432.278577][T12478] RSP: 002b:00007f18dfc72a88 EFLAGS: 00010283 [ 2432.284652][T12478] RAX: 00007f18dfc72b30 RBX: 0000000020000690 RCX: 0000000000000000 [ 2432.292626][T12478] RDX: 00000000000000e0 RSI: 0000000000000000 RDI: 00007f18dfc72b30 [ 2432.300601][T12478] RBP: 0000000000000000 R08: 00000000000000e0 R09: 000000000000000a [ 2432.308579][T12478] R10: 0000000000000075 R11: 00000000004e0ca0 R12: 0000000000000005 [ 2432.316561][T12478] R13: 0000000000000000 R14: 00000000004db990 R15: 0000000000000004 04:22:57 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040)={0x0, 0x0}, &(0x7f0000000080)=0xc) syz_mount_image$jfs(&(0x7f00000001c0)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0xfffffffffffffffe, 0x95, 0x0, 0x1, &(0x7f0000000100)={[{@resize='resize'}, {@nodiscard='nodiscard'}, {@resize_size={'resize'}}, {@uid={'uid', 0x3d, r0}}, {@iocharset={'iocharset', 0x3d, 'macroman'}}, {@resize_size={'resize', 0x3d, 0x400}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@euid_eq={'euid'}}]}) 04:22:58 executing program 1 (fault-call:3 fault-nth:32): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) 04:22:58 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x3f00}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:58 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x3000000, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:58 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x4000, 0x0, 0x0, 0x0, 0x0) 04:22:58 executing program 0: r0 = openat$sequencer2(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer2\x00', 0x0, 0x0) openat$cgroup_ro(r0, &(0x7f0000000080)='cpuset.effective_cpus\x00', 0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000100)=ANY=[@ANYBLOB='resize,resize,resize=0x0000000000000000,discard=0x0000000000000200,iocharset=macroman,resize=0x0000000000000400,fscontext=system_u,euid=', @ANYRESDEC=0x0, @ANYBLOB="2c00544c9df1a26e5c9417882826ab38152166bfa0ef48f537033875d1aad3e3da08a0af8a8c399811eff44551ec540daaeaafd522ed41a7fd6b82ae8a16adb6ef0cda56f465b0d487959bc9e230b3a5158ee81da7a29c937a85f1720d092dfb1f3b8121badaeee3fd57bc924634475380f3d324601483cf1e7629"]) 04:22:58 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x74000000, 0x0) 04:22:58 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x4305}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:58 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x400000, 0x0, 0x0, 0x0, 0x0) [ 2432.754966][T12509] FAULT_INJECTION: forcing a failure. [ 2432.754966][T12509] name failslab, interval 1, probability 0, space 0, times 0 [ 2432.767606][T12509] CPU: 1 PID: 12509 Comm: syz-executor1 Not tainted 5.0.0-rc2-next-20190115 #12 [ 2432.776632][T12509] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2432.786709][T12509] Call Trace: [ 2432.790005][T12509] dump_stack+0x1db/0x2d0 [ 2432.794348][T12509] ? dump_stack_print_info.cold+0x20/0x20 [ 2432.800080][T12509] should_fail.cold+0xa/0x14 [ 2432.804673][T12509] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2432.810492][T12509] ? __sigqueue_alloc+0x235/0x710 [ 2432.815523][T12509] ? find_held_lock+0x35/0x120 [ 2432.820296][T12509] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2432.826549][T12509] __should_failslab+0x121/0x190 [ 2432.831498][T12509] should_failslab+0x9/0x14 [ 2432.836030][T12509] kmem_cache_alloc+0x47/0x710 [ 2432.840806][T12509] __sigqueue_alloc+0x3ca/0x710 [ 2432.845659][T12509] ? dequeue_signal+0x6a0/0x6a0 [ 2432.850529][T12509] ? __lock_acquire+0x572/0x4a10 [ 2432.855464][T12509] ? mark_held_locks+0x100/0x100 [ 2432.860422][T12509] __send_signal+0xdbb/0x1a10 [ 2432.865104][T12509] ? prepare_signal+0xe10/0xe10 [ 2432.869966][T12509] ? lock_acquire+0x1db/0x570 [ 2432.874644][T12509] ? force_sig_info+0x55/0x310 [ 2432.879419][T12509] ? kasan_check_write+0x14/0x20 [ 2432.884365][T12509] ? do_raw_spin_lock+0x156/0x360 [ 2432.889389][T12509] ? lock_release+0xc40/0xc40 [ 2432.894066][T12509] ? rwlock_bug.part.0+0x90/0x90 [ 2432.899038][T12509] ? trace_hardirqs_on_caller+0x310/0x310 [ 2432.904764][T12509] send_signal+0x49/0xd0 [ 2432.909010][T12509] force_sig_info+0x251/0x310 [ 2432.913702][T12509] force_sig_fault+0x11b/0x180 [ 2432.918480][T12509] ? force_sigsegv+0x120/0x120 [ 2432.923253][T12509] ? kasan_check_write+0x14/0x20 [ 2432.928187][T12509] ? up_read+0x212/0x2b0 [ 2432.932439][T12509] __bad_area_nosemaphore+0x332/0x420 [ 2432.937823][T12509] ? vmacache_find+0x65/0x310 [ 2432.942512][T12509] bad_area+0x69/0x80 [ 2432.946505][T12509] __do_page_fault+0x996/0xda0 [ 2432.951265][T12509] ? __ia32_sys_mknod+0xb0/0xb0 [ 2432.956119][T12509] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2432.962198][T12509] do_page_fault+0xe6/0x7d8 [ 2432.966700][T12509] ? trace_hardirqs_on_caller+0xc0/0x310 [ 2432.972341][T12509] ? vmalloc_sync_all+0x30/0x30 [ 2432.977188][T12509] ? __bpf_trace_preemptirq_template+0x30/0x30 [ 2432.983352][T12509] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2432.988990][T12509] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2432.994707][T12509] ? page_fault+0x8/0x30 [ 2432.998956][T12509] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2433.004507][T12509] ? page_fault+0x8/0x30 [ 2433.008747][T12509] page_fault+0x1e/0x30 [ 2433.012904][T12509] RIP: 0033:0x451b7f [ 2433.016798][T12509] Code: bc d1 f3 0f 7f 27 f3 0f 7f 6f 10 f3 0f 7f 77 20 f3 0f 7f 7f 30 49 83 c0 0f 49 29 d0 48 8d 7c 17 31 e9 95 0b 00 00 66 0f ef c0 0f 6f 0e f3 0f 6f 56 10 66 0f 74 c1 66 0f d7 d0 49 83 f8 11 0f [ 2433.036398][T12509] RSP: 002b:00007f18dfc72a88 EFLAGS: 00010283 [ 2433.042470][T12509] RAX: 00007f18dfc72b30 RBX: 0000000020000690 RCX: 0000000000000000 04:22:58 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x4788}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:58 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x6000000, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2433.050437][T12509] RDX: 00000000000000e0 RSI: 0000000000000000 RDI: 00007f18dfc72b30 [ 2433.058414][T12509] RBP: 0000000000000000 R08: 00000000000000e0 R09: 000000000000000a [ 2433.066389][T12509] R10: 0000000000000075 R11: 00000000004e0ca0 R12: 0000000000000005 [ 2433.074357][T12509] R13: 0000000000000000 R14: 00000000004db990 R15: 0000000000000004 [ 2433.165218][T12520] JFS: Cannot determine volume size 04:22:58 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x7a000000, 0x0) 04:22:58 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000000, 0x0, 0x0, 0x0, 0x0) [ 2433.204141][T12520] JFS: Cannot determine volume size 04:22:58 executing program 1 (fault-call:3 fault-nth:33): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) 04:22:58 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x4888}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) [ 2433.238937][T12520] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:22:58 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x7000000, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2433.303912][T12533] JFS: Cannot determine volume size [ 2433.311627][T12533] JFS: Cannot determine volume size [ 2433.323535][T12533] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:22:58 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x6000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:58 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000001700)={[{@resize='resize'}, {@resize='resize'}, {@resize_size={'resize'}}, {@discard_size={'discard', 0x3d, 0x200}}, {@iocharset={'iocharset', 0x3d, 'macroman'}}, {@resize_size={'resize', 0x3d, 0x400}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@euid_eq={'euid'}}]}) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000001600)='/dev/snapshot\x00', 0x101000, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_PEELOFF(0xffffffffffffffff, 0x84, 0x66, &(0x7f0000001640)={0x0, 0x9}, &(0x7f0000001680)=0x8) getsockopt$inet_sctp6_SCTP_DELAYED_SACK(r0, 0x84, 0x10, &(0x7f00000016c0)=@sack_info={r1, 0x81, 0x7f}, &(0x7f00000017c0)=0xc) syz_mount_image$reiserfs(&(0x7f0000000040)='reiserfs\x00', &(0x7f0000000080)='./file0\x00', 0x1, 0x8, &(0x7f0000001500)=[{&(0x7f0000000100)="4705006546f46ef3899da564c7d17f1e5841c659539e36b3b70e59e98354eef7c87fcb354f4ffaddaaa2b5df9705afd76a9b068664a8b3bfb5da5b585c34e415fe48c4fa977db408b54c57eeba5a90435dd3011bee03599c13bd0ecdedbc52f1ab98788ee60a05c0c7b8ad9eaf1739a0139f0db1918b37c3f278971a026543a7b5985b3c86976f6b0344476ee8f39d54b538a5fbabf48bed649e9194802e7c784fe5671b404fb085feafe1af0c7fb4c354a7f2f1557167633a7fc9174150d453a4aea986fd55a3cd0027f3afd27762899f327c58e4572398125b9aeeddf57fd48393115812f05f9815b54df4e3cc09f4ceaa1228bcc298dec864f9dac653b4819b8b7e1ca527da206a0e7cfdc19b8b46888aeab81abd97bd74ca811325a64a45501cf474770c21e71f2ea4831d9e019f49617fba31b77091abd1ccf7f5f239bf729869506bf57033263aa09a0bd09f4bf3d704e6566d1d58dca7901e14ae92e71463360491489671156d0cfe6c212404caf9561094de3d4eea2f75716c716949ad69ea172e8445fc255dbf7618f337b2863c0e9f40bfc698f47b1fe8d76946296561274225aad96af8eab6c80db4ab4b6e6f8dcf4fbab205d19ca1841d6813cb4b7dce9e296b92cd22da6f120c79540c69df421e58a72886a708c8a23a5fb1fa9b8e27c2a9d0ac3143fd0b6f11ca3627d2ee15bfe3299d15872290a4e9487cde7c6345db0aec763ef3564d168168f047fc217df0295c976e2a97099b3943bc4520776de80fd650def2bc1d0206f9caaa59d3eb12eba0b95cea4b259b5b6511b83f9f972dcd4f6627be55f45aaf3fe5818ffdb31b66e292cfb41c82e8fb10b6e651f43d4bdac560a7f6810c57f093cdea28dbbd8aa2c8fb4d806f568f525b18ec83962fa65f8ebce7f0a00f0d761b48d3e4b3f04ec0e244fad680b51babfd0835fb4b36a61cf5c77ce54c69da4368ada3fd677d16467f47ec2707b8a4855fa556e4e6fd73d9547b7abe7e3b509c5608266b592e5f29602f8546baf471784f200aa4c51cc8b5c7132ccbef77b096d7b36732408ad2b635bd10d0d4918c9e8e42860c390a550f93ae9cc569d19c239d0bd1856e549b4c7250b0bebc6e8e6755bc94f6a6a87a46cc2998961d47dc139bcd5b789dd05240336e62398cabfbf886cd4e3d6b2cfe034a38cf1137400867655adf6251c753f0652e2e8cb72fbbae63c1810d0d1959434002fcdd3019448386563f703bac57097283d572789431fe3ad91d071d4f3597c4b01b7b25f2732d54fa624e0351615ecf2068b9bd970400b0dbba6b4d035b4430166a35771bc1ec4a48fc0d00318d133a4ea323766a7d89d64fc107346b0f5edcf15c59330525c5a96470503bf7925217a265aa34f0a7c105a0b69055705de46e5d54e205300d64af02a746b3645c887c6008a7ebd84f19dc0119c85a83b07d8fa0b6fb869c9e4049dab1f69a085910c1997f3966edef053768574e530d7e07df3f728a2dcf7a07bc62257438c501226e53d1a05ec0823bc49668e99f5f7922ec65b25f44fbbcc52faea03c532b0f27a060c0f1a1dc2951e343d642a82dd24066a42185d9ceb1249eabbea38afe42b5daaf2d94e7cc528840cc76b6de24bc2d59507591907a9b2bc9e533f1f22f3bd651209a67a1c04ed93e0c3901e5311eb1c5f7debdad174644e5316ab81f696a3dd7ffca87b85f16d1a23199f04b4b0c5373e244252fce5a1156c0789cc5be0ed75a2a71cbb0c35880de96e80780e156200ffe9306b94167c30ad8846981a4303f296934d59821db0a6de5fef27d59815150f9455411c51bb7c680fe804570c92fc47bc7beb42b22fee69fbe97f40ee2ad8b3b57fe74b68a460e5dd3b17db336df3664852c7f9e47ca28c706eb90017bc8359b1ec1180e575aee2cc8a9747215afe0fd3586f1d0994b08b6bad946a93aa3d53d252ac33effc65db4c84597437944901662def3673607e033a1644c04440fdf72454bdcc3dfee559b4514873065f09cbc89023c8b7322f917239e1df032860f2132d2a7a927b3341d6e8bc9392184dff38396ed68c5aa06663e78d178acab40d3dcfaa1fce39d28e1a2d59da2557ed64854bcb961cc95ea73c895ebfa56d28775a596be24f1ac7b40e4ec58e140264178b7509dbe41179ec544d26ddce96155939fabf1590e26526af3fe230b6cbc9ff41cbcbf8f4ff107888732ec54cfa62020d5fbc3d9f0cb6357f0f98e8661fa50f1e58cef1c7890e6c4ee2921da98a53c8b478b5d8c03f6cdcf0eba50ed8af7293e4309996828335b07f4232c24efa54f97f9bc239011e225b9ac54e2a0b9fb3d55778b18b243362fb4021c53164b598402a18fad6e6ff36906a7da2a4d27b363b113a40b5efea484be85e573005352554e1bcdfdf950a3d0995476c92d18d3e6cf13d4aed0fb0af60b6016b89c79872801795c649f8c6456c40ac976142e865a6d68c3c6f484236a9e9880fa59d0aece4cdae437558d967b1d65bac527d0a8f321dc46570dfd30b8b442ca1d7793051d1f366567e4022749087d633bd71ac060201b570b082bb057ec5a3e4a305edf9fe4194c8a1aa0a5b280244cf1fa2b29d092ec85be1c59cf614b5e70dbe5a770f8e3f89fcd56df82696a2e6fce5219c10e7160dfad389670dccbc28b13d13edaf06f9255cfb51fefb35a883a94f654b3211755ade7458ff782e351a063c54e45379554ec42a2f8519403657fd089f581bd0a2f212ef43998ba70f137dca5155c4f81722cb363b8edd04d68f95789b0334f8bd50d9e974459598b739b1f03d1ee110bf9d612ae9758bebf51f85a32e0099e8bdf6dc49ba66d97f82956cebb230df9a0b84586a6e2dabfb0b31fb0604a6d6a574e176fab7786ad9ebc82abf8addfc926f483f07ec0324e273f0c033efb72f9a1b523ce2d8f088e88804fdce8835a943c1bbc53eea65392f9c2f8e19fae3428f3a1d3ae57b08b197a16104748ccb39e7629aba9b0c8d4104637b6521b0ce8e8b034965d0f6d7e47ad3d9b4cb7b36f55ae1c5139bb5fe9dbd0c9e6967f8edecf0d2b52e41fa726783b8d758f639d74d4f6121886d810f34e73dde027c4bf9e371d214308ba32df16832c8759692f320c05968cad32eb0668c82a4124669d3f9a928b0c94dc9614f5c570951d462effca4947f89eaf7a691306e0563bd9ff0e438897118855e5c60dc1dca40ea58b650c3f1a8ddb348e10743ed253a3f56f86bf0c44c4a3854a66984495262004b29fbb86254b10c04e481f021585b0c4cb93afdcfaa254eb88b73dae3ef7a87dc6247372fe1ac35a91e6cd9851f7630a6eddc8fc00e1b0d71210f22a7abd52b14e7c8002d8d9283bed2ba97e35db3717f0c0d47bbd80b8a7e080895310552de5212a081e169c7a6036b686c4117873667814907005275a646cb6d6350e1316f45f2dc3e95ab66c85c459a79c887e6fbb8d6e07c17cd134e0a7723eade4b8c5ce34b8822fbcef99e83d9c4944f2fbda732a3ea36de443c544a3c8d12a533d1363418eae2de75bc1b3cc4a6f7e00058b71f94f1720f62f3e2da7fd4d64a7431c8a1f37a39774d9b481a77ac97341ad2e0427496f3c60498115cc48806576aef9b952be083239f8275c721bb3003decb0d038022b9194c4e3551aa8d3939d358981b2dd9fa8b30c50ec4447778ea7982a898764af53dfc3b56ac828def6ee1fb28718687e8141868792b2d1c1a5492b1d9c1fb9d4ce1a4884a0c29bca6500e1d3e4f6bae6c8ffadfe79d92ea8c95f149329581acbbd42e4c90a68c43e0713ee60f6c10c50ab2d581600b7feb0992eefb3c429882164bc090d1c10ddd4bdaccfc63c6e2be4306c2581fdb4b8b8766337d4d2b71d69b6c51afe0766844a86df3fb38de380ecc0bf1dff252e7e989b11eabda242109bd980cc7a68da4485fcf38f6929e6cd4529387c074f20f6712a45ce07dc295654c4db7d94e760bdfdf6fa9b165d36334e05c90e7b6d1b3410aba79b1596f8ec51943ecdd4be7168e024955b33ded0034b728932735ebf2daeb3ead90e8990f66536ba3b6236b351095333b53eb5ee93a4c9e0bbf7437a3c67b0499214210ed774c346e50cd2f94a1656cb6a2fcf3cdb3ffa1a2a09d3e8e29edfeab1a69f78a596e06b5499873017dde6c108915a4dcc8dc9d8053f5bf0365c90fe77f8cfd48a09508cde302911a9282a5680a10141aa8bf93de545fb48b95b0a98e3e6b7fc43a7a1b025cd627e3e0bc9cc911cf6fcbf3c7f52407a34bded485cff53a52ba173f0f1e819826bdc04b4a7ae28df1dcf06f9f68fec513fc281e00d7b624af697ed8fc2fb6d5cafc15fa355e30b9d3c95ab8611b37466d183aa01f0f1d50f409bdaa133498f531e36ed5f64e9bbff5624a61a38f00081a008e0e6e12921cd2c2de72341a2c7601b5c0c9155f706632ec0348eda106fbd0ab07cc54a0061b965ff5ed0051362d1c48cfba2de5f434c66e01709adbb6e427eedac4b53437c3a67d1676cd4befe80237bbb753b147433587c174e49edbc40ddcfa7a6847feb9219befc1f6d8d8d6f0784ce2c4bafb1ff1037530b4bd71471e2fad24f7256731cc1ba1578a541c2850797121f5cec6cc8dd71e30ca64faf9ea79126076bdd5fba7510c77d7e631c4ae3f8fcf45c4a604a6737f21f1e4afe1a3a6a8c9de29761ec09a5f16ab6ff9d09621c973e8ddd429fb8227b1efbe87d6b11677ad6078cb8dd545afe624c2cb27bcc56cd31e12fa563f2c0889b605148b4819dce88714fa65d4266c0809a056b695be58eddd970924ab3fa73115cbeaa168011cd36d724fee28d8415f86958a4561ec7ad73c0e516bfef994d6499138ed0ecf89da6497974d9445331ac487b902cb4e7ced0e1ae765a0b6a1ddaf606315c3f50296f5f1423fdc34fe24d09854ff2f32fd8fbd93abda081ac63c5ff2884d1ea43eb7f76dec4d30de8ac165231e3e76a2d10291bdd8543599cfa0f93d04a956ee935f10a0e920b418308c477fae836cfbf6f0cc8746fb907419e915584a2773b19558cf2d4432f1ff14143abfc7a282be393b7f46238632eb330eaa89c4498511c78a2d771c3f99bfbc91dce21b5dfe94f7243a298a9aed914967db58ca7e639ba9f293135d5d00566b17a8379d3b49086517537992fc32d4860b70f8756aa2bddc59c583cbb88e2a18a350cca1b59d8e0b4221ae2c13b77380b27acdebe76d9c9c99e6595f5575bca3a80ad2866ad06da58028f0579cbfdeb6e6a9c48fc303595cdaffa027ba388f28e5e7cbd674db94be27f66667851bef7ddbd5e78435aa270f423fb3af3239fdf7d68d962f9485ee5e5c9dfb92a2bb325f25ad2c07362d41678646c9717ed14c008cecd91506d102a5e70067e41eb8858d151b1343ac6057665f38cb306887803600b1ee3f4aafb0a46a13ca4d3546772fd8c1bc06d5d23fe33050d677ff91d432bd62c6b224c2f633bd58e4339a16a7f086f6c7dbf5d701056de2102531ebea19115e1d1d78adf36aefb73917f3c08f785d0c482930d1e1c24330c998538691eb317b7ac91b8c7c31c52799adb74ab5dbf851e89352cc152b7bcafd2bf1695769b57545f5a8bcca7faabcd0af8e818e3669ad1f6dce84ad563c9513662bb31be6b096f07b25815c372a7208c4d2f9efc03ea1d26d4e85e8682b9a3654905d6d4f0471502cf612150e3b40912fae3bded43167c6832e641fb8c2f4354926f7fe4d13ad562ed274aa3e75913e3f12358329afed5ffee8fbe3a99be852a7c043a6ba6dbd701262df6de713e2e49", 0x1000, 0x100}, {&(0x7f0000001100)="deeee789bc7f0177e03c148950bdfea7d78a34274ee293aad8961753bfa677009035645545e3214f7b2473437f6955b48f1cdf1d1f5291bc5b5f5c32e699844913a435c2a1cfb6c19f2e493b31cc3faabff1b1d4189645fcb4eb9a095cb3fc45e3d53f65f4c33d947770747b8ea7d3681f7c339659555880982a2cf451e4fb4693456bd02ce0a2dbfd4eca5de914a5aa6c6e9b4b9a6281fa900492757b90c5b2dd35db60cbe3db152fd1283210b43880adc813a99c", 0xb5, 0x8000}, {&(0x7f00000011c0)="d479a92bebee4849fe6955aef76ef13ee21538c199fd1c34bd1f905aed4f6e83d29322bc17", 0x25, 0x1ff}, {&(0x7f0000001200)="17bc3c4ca7dba0b90024fd7b3afc182805541a5bc99eea026d79216cf467b244a3c22deb13c4d3b16976a92c2b052f6e5b1031617cee039894e5fa81bf999ee52151f7e411ba94d55bc4240dd8d4f6c4f5b3a41cba0582d3a9d3581a345fc06851ca8e2e441dead6ff45a20a28112cd656f23a9ccdbd24b7e27f163f19f7177035c7d64875471014f437fddefff678e3", 0x90, 0x9}, {&(0x7f00000012c0)="12b85ca8773f39bb41d522bc8625c9f46744bd5fdfe3f5d49a216ca8b2c98992cf5834e8b963aeb7aa2c28227e79a0522ed966be4fc08d91ae5099ea65410080cf586e5a7b3637da3950fc7f6046502596bc5342e68238149240e71bcb600e24634f539778514fc6f6be75352aa8e62fbe736eaabe257619d0ae3d9124ab2d5d595c666d03520fed5f3e08237c7d1a819f0b7f74042ae2abc9c00bf5142d0f5103f4bd0819ab10d76944befe58ab1fd65dac78d71ed9f1349dbb213f86a34b54525b85402948437bd19cf6dad2129977c101f2", 0xd3, 0x9}, {&(0x7f00000013c0)="f47f6d1c2ca6a75600bd83473c9b7c94559a122701e5729a752aeed6314ad617acc8667dd99c56f816877803723af84d3ec1f64eb94df264491804d79c6ca2db5a6bcf2a5b8c9537fb7eff0e2d300667601767a37a5eaa659e309ca4feb8145d286d0554b90646f117fa35bf35082055240209e17596da24b1eff3a5622b2b1d4b4213a6b12152765f2e3f354c96fda7e5918739fc59bec6d04d277d", 0x9c, 0x6}, {&(0x7f0000001480)="608446faa24f84d98f4ea82a85e7be3eedbed6", 0x13, 0x5}, {&(0x7f00000014c0)="0b8a841381cca76808cae90ae9c9b221509c07a2202ed6c70d6e38b2dc9973995f45ed16512115c372b8b93bff5133bf824b59", 0x33, 0x1000}], 0x0, &(0x7f00000015c0)={[{@noattrs='noattrs'}, {@jqfmt_vfsold='jqfmt=vfsold'}]}) 04:22:58 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x8000000, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:59 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x8cffffff, 0x0) [ 2433.512250][T12540] FAULT_INJECTION: forcing a failure. [ 2433.512250][T12540] name failslab, interval 1, probability 0, space 0, times 0 [ 2433.592208][T12540] CPU: 0 PID: 12540 Comm: syz-executor1 Not tainted 5.0.0-rc2-next-20190115 #12 [ 2433.601276][T12540] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2433.601285][T12540] Call Trace: [ 2433.601311][T12540] dump_stack+0x1db/0x2d0 [ 2433.601332][T12540] ? dump_stack_print_info.cold+0x20/0x20 [ 2433.601352][T12540] ? should_fail+0x5c5/0xd13 [ 2433.601370][T12540] should_fail.cold+0xa/0x14 [ 2433.601388][T12540] ? fault_create_debugfs_attr+0x1e0/0x1e0 04:22:59 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x2000000, 0x0, 0x0, 0x0, 0x0) 04:22:59 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x8060000, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:59 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x6488}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) [ 2433.601422][T12540] ? ___might_sleep+0x1e7/0x310 [ 2433.601439][T12540] ? arch_local_save_flags+0x50/0x50 [ 2433.601466][T12540] __should_failslab+0x121/0x190 [ 2433.601487][T12540] should_failslab+0x9/0x14 [ 2433.629456][T12540] __kmalloc_track_caller+0x2d8/0x740 [ 2433.629474][T12540] ? strncpy_from_user+0x4e0/0x4e0 [ 2433.629493][T12540] ? strndup_user+0x77/0xd0 [ 2433.629510][T12540] memdup_user+0x26/0xb0 [ 2433.629526][T12540] strndup_user+0x77/0xd0 [ 2433.629548][T12540] ksys_mount+0x3c/0x150 [ 2433.629565][T12540] __x64_sys_mount+0xbe/0x150 [ 2433.629588][T12540] do_syscall_64+0x1a3/0x800 [ 2433.639957][T12540] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2433.639973][T12540] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2433.639993][T12540] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2433.640019][T12540] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2433.640032][T12540] RIP: 0033:0x45a93a [ 2433.640046][T12540] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ed 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ca 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2433.640054][T12540] RSP: 002b:00007f18dfc72a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2433.640073][T12540] RAX: ffffffffffffffda RBX: 00007f18dfc72b30 RCX: 000000000045a93a [ 2433.650164][T12540] RDX: 00007f18dfc72ad0 RSI: 0000000020000380 RDI: 00007f18dfc72af0 [ 2433.650173][T12540] RBP: 0000000020000380 R08: 00007f18dfc72b30 R09: 00007f18dfc72ad0 [ 2433.650180][T12540] R10: 0000000000000008 R11: 0000000000000206 R12: 0000000000000005 [ 2433.650188][T12540] R13: 0000000000000008 R14: 00000000004db990 R15: 0000000000000004 [ 2433.859096][T12550] JFS: Cannot determine volume size 04:22:59 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x3000000, 0x0, 0x0, 0x0, 0x0) 04:22:59 executing program 1 (fault-call:3 fault-nth:34): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) 04:22:59 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xc0ed0000, 0x0) [ 2433.888967][T12550] JFS: Cannot determine volume size [ 2433.894229][T12550] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:22:59 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x800e}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:22:59 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0xd000000, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2434.005319][T12550] JFS: Cannot determine volume size [ 2434.046530][T12550] JFS: Cannot determine volume size 04:22:59 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x8035}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) [ 2434.070876][T12550] jfs: Unrecognized mount option "fscontext=system_u" or missing value [ 2434.120285][T12570] FAULT_INJECTION: forcing a failure. [ 2434.120285][T12570] name failslab, interval 1, probability 0, space 0, times 0 [ 2434.169044][T12570] CPU: 0 PID: 12570 Comm: syz-executor1 Not tainted 5.0.0-rc2-next-20190115 #12 [ 2434.178107][T12570] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2434.188169][T12570] Call Trace: [ 2434.191479][T12570] dump_stack+0x1db/0x2d0 [ 2434.195826][T12570] ? dump_stack_print_info.cold+0x20/0x20 [ 2434.201560][T12570] ? should_fail+0x5c5/0xd13 [ 2434.206164][T12570] should_fail.cold+0xa/0x14 [ 2434.210770][T12570] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2434.216579][T12570] ? ___might_sleep+0x1e7/0x310 [ 2434.221425][T12570] ? arch_local_save_flags+0x50/0x50 [ 2434.226714][T12570] ? lock_downgrade+0xbe0/0xbe0 [ 2434.231577][T12570] ? lock_release+0xc40/0xc40 [ 2434.236283][T12570] __should_failslab+0x121/0x190 [ 2434.241228][T12570] should_failslab+0x9/0x14 [ 2434.245743][T12570] __kmalloc_track_caller+0x2d8/0x740 [ 2434.251118][T12570] ? strncpy_from_user+0x4e0/0x4e0 [ 2434.256226][T12570] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2434.262468][T12570] ? strndup_user+0x77/0xd0 [ 2434.266980][T12570] memdup_user+0x26/0xb0 [ 2434.271224][T12570] strndup_user+0x77/0xd0 [ 2434.275561][T12570] ksys_mount+0x7b/0x150 [ 2434.279814][T12570] __x64_sys_mount+0xbe/0x150 [ 2434.284520][T12570] do_syscall_64+0x1a3/0x800 [ 2434.289120][T12570] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2434.294757][T12570] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2434.300485][T12570] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2434.306044][T12570] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2434.311936][T12570] RIP: 0033:0x45a93a [ 2434.315832][T12570] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ed 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ca 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2434.335443][T12570] RSP: 002b:00007f18dfc72a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2434.343856][T12570] RAX: ffffffffffffffda RBX: 00007f18dfc72b30 RCX: 000000000045a93a [ 2434.351827][T12570] RDX: 00007f18dfc72ad0 RSI: 0000000020000380 RDI: 00007f18dfc72af0 [ 2434.359799][T12570] RBP: 0000000020000380 R08: 00007f18dfc72b30 R09: 00007f18dfc72ad0 04:22:59 executing program 0: r0 = syz_open_dev$usb(&(0x7f0000000140)='/dev/bus/usb/00#/00#\x00', 0x7f, 0x100) getsockopt$TIPC_DEST_DROPPABLE(r0, 0x10f, 0x81, &(0x7f0000000180), &(0x7f00000001c0)=0xffffffd7) lsetxattr$trusted_overlay_redirect(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x3) syz_mount_image$jfs(&(0x7f0000000200)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000001700)={[{@resize='resize'}, {@resize='resize'}, {@errors_continue='errors=continue'}, {@noquota='noquota'}, {@iocharset={'iocharset', 0x3d, 'macroman'}}, {@resize_size={'resize', 0x3d, 0x400}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@euid_eq={'euid'}}]}) 04:22:59 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x10000000, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:22:59 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x4000000, 0x0, 0x0, 0x0, 0x0) 04:22:59 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xf4ffffff, 0x0) 04:22:59 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x8100}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) [ 2434.367772][T12570] R10: 0000000000000008 R11: 0000000000000206 R12: 0000000000000005 [ 2434.375752][T12570] R13: 0000000000000008 R14: 00000000004db990 R15: 0000000000000004 04:23:00 executing program 1 (fault-call:3 fault-nth:35): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) 04:23:00 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x8847}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:00 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x14000000, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:00 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x8000000, 0x0, 0x0, 0x0, 0x0) [ 2434.571325][T12588] JFS: Cannot determine volume size [ 2434.576592][T12588] JFS: Cannot determine volume size [ 2434.602415][T12588] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:23:00 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xf5ffffff, 0x0) 04:23:00 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x8848}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:00 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x20000000, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2434.683405][T12595] FAULT_INJECTION: forcing a failure. [ 2434.683405][T12595] name failslab, interval 1, probability 0, space 0, times 0 [ 2434.757508][T12595] CPU: 0 PID: 12595 Comm: syz-executor1 Not tainted 5.0.0-rc2-next-20190115 #12 [ 2434.766575][T12595] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2434.776643][T12595] Call Trace: [ 2434.779964][T12595] dump_stack+0x1db/0x2d0 [ 2434.784330][T12595] ? dump_stack_print_info.cold+0x20/0x20 [ 2434.790068][T12595] ? add_lock_to_list.isra.0+0x450/0x450 [ 2434.795731][T12595] should_fail.cold+0xa/0x14 [ 2434.800349][T12595] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2434.806177][T12595] ? ___might_sleep+0x1e7/0x310 [ 2434.811049][T12595] ? arch_local_save_flags+0x50/0x50 [ 2434.816363][T12595] ? lock_downgrade+0xbe0/0xbe0 [ 2434.821227][T12595] ? __check_object_size+0xa3/0x790 [ 2434.826438][T12595] __should_failslab+0x121/0x190 [ 2434.831393][T12595] should_failslab+0x9/0x14 [ 2434.835925][T12595] kmem_cache_alloc_trace+0x2d1/0x760 [ 2434.841308][T12595] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2434.847573][T12595] ? _copy_from_user+0xdd/0x150 [ 2434.852441][T12595] copy_mount_options+0x5c/0x440 [ 2434.857386][T12595] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2434.863641][T12595] ksys_mount+0xa7/0x150 [ 2434.867905][T12595] __x64_sys_mount+0xbe/0x150 [ 2434.872589][T12595] do_syscall_64+0x1a3/0x800 [ 2434.877185][T12595] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2434.882823][T12595] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2434.888573][T12595] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2434.894135][T12595] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2434.900054][T12595] RIP: 0033:0x45a93a [ 2434.903955][T12595] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ed 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ca 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2434.923578][T12595] RSP: 002b:00007f18dfc72a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2434.932009][T12595] RAX: ffffffffffffffda RBX: 00007f18dfc72b30 RCX: 000000000045a93a [ 2434.939997][T12595] RDX: 00007f18dfc72ad0 RSI: 0000000020000380 RDI: 00007f18dfc72af0 [ 2434.947970][T12595] RBP: 0000000020000380 R08: 00007f18dfc72b30 R09: 00007f18dfc72ad0 04:23:00 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000001700)={[{@resize='resize'}, {@resize='resize'}, {@resize_size={'resize'}}, {@discard_size={'discard', 0x3d, 0x200}}, {@iocharset={'iocharset', 0x3d, 'macroman'}}, {@resize_size={'resize', 0x3d, 0x400}}], [{@seclabel='seclabel'}, {@subj_user={'subj_user'}}]}) stat(&(0x7f0000001540)='./file0\x00', &(0x7f0000001580)={0x0, 0x0, 0x0, 0x0, 0x0}) socketpair(0x1b, 0xf, 0xffffffff, &(0x7f0000001bc0)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$ax25_int(r1, 0x101, 0xd, &(0x7f0000001c00), &(0x7f0000001c40)=0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000001600)={{{@in6=@remote, @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@multicast2}}, &(0x7f00000017c0)=0xe8) r3 = accept$unix(0xffffffffffffff9c, &(0x7f0000001900)=@abs, &(0x7f0000001980)=0x6e) sendto$unix(r3, &(0x7f00000019c0)="9b2027b21de262d0fb39ccc20323da3ba4f948e300392664e7ef8f6d467673e98a075ad411b166417c7904f4be75d5cafa38de8dd1c8f7a43ce537b332f072388bb28c5ad22fb028e095487c7daa991bbc454e7fab3e878ff787707f8b4669fb75aadb835d8f3ab36a105bae1c804b7b7941d8e14c98d083dd8f713a7804171179508b8bd771e8e9aad334373fdde833e1854b96403d3ecde1a41c6ae2f32168fe01d295c77bc246b0a0ad5703ca71f5c0b15bfd1581f02f33b06f90ff601ae4e4b0fb87ff3b38835e5b83ecf1f47b0397e29706e44e9881", 0xd8, 0x40, &(0x7f0000001ac0)=@file={0x0, './file0\x00'}, 0x6e) syz_mount_image$erofs(&(0x7f0000000040)='erofs\x00', &(0x7f0000000080)='./file0\x00', 0x2, 0x8, &(0x7f0000001480)=[{&(0x7f0000000100)="b2b22060609e456720fcf8c46f4cff3e6d8d2f694f3c3d661c6d5b870473c71ccdfec41d2bf16c01c7b49083226e813cfa2a5dc1cf2a2de83a8f1dbb2341fa084482e62764f925c74d903089ea1c1915bf9c61bbe55c538a13c0aa884933d0bef29ca764af288afef3cc14d7d9de0da283f4d2cd2618d8f860e0efb58b1e6336d88746f22fb3d0dabc11d28d6795352476640a7e5a466ca3c8cad32686c46d1573918ee9ee9db45e8db9a0b2ecd6a5dc93bc888c", 0xb4, 0x7}, {&(0x7f00000001c0)="dc93b424e70a3bccb6546ab37bdf92869ba39aeebce8bbc6110568f96c6630662feeb3a39586a7eb994fd1ffcb99047f5bb9a8fcc46a3050618ed54c4065104e1881b73bd56f77314f234b2eaf8e48eb1ad7ae575abaf9a4375b965e7a6f40521cc6782e74d547b2e05842e1a092478aa6ca181a793e1f75234c6b26b897c45c7514aaa87d95b8f02d0ff6a711ad7c17a2e337a27e4e3f24", 0x98, 0x4}, {&(0x7f0000000280)="1517472909d7ecba9122c2149e87969d45bd0915da38c7bc86b24d78dbac4f8fd3b7f807b4d5aff12c84a9bf8c7258a6ce0606ac3326a9904181f181e7905d076bcafa4ff87829cbdb647fd66ccd0e48f08a792a346bb058ccb2490ae5b7b3599d6a93800895baa3da87b981e7c48ea2435d93aab54f8183", 0x78, 0x1e319efd}, {&(0x7f0000000300)="7dbcff6ce1d5e23565b5f2a496dc588a6aaf74227c6ea8fd9c3597d05771e8e36a9411f6f60b2a6735e68744", 0x2c, 0x1000}, {&(0x7f0000000340)="a1ac2d6edfeb1e7c241f8bb9fbbc28b577942d55c29693616d0f72a3b2e3fb257e7f08876f43439395647832f5b592a32f4b625fa031a04f2fab0d6fbc744846ab9fb8c0ccdc9f9fe6c0a585eb54316f9f84d4f1a4aa70683c8564466877651b23e15eff7abaf5f1244931d132a8378cdab2a3b97aa260df12f6257943afff0cb3fbafd7a8c6027561f24700b478a88fb8a57b164835208d9156e61464b7158a87c0c0d3617f8db9d03abd49e9260858bc7cdad309d883c7317649a0228b898c7000a0927948a47e57cf7bf6e18dd7c875c3157d19af3a65d8222b62a23264775f3029a1087dbd77bd621cf87f2306b0665c45b1fbc250700a5ebf894728ce7e82a488b519923edcc79da53b4de63ed467f617e1eabe7da517c8ba7976e377eec67dfc26c229c7fa905cc21638388be7becd5108530947c3ee4f0c74f65fe5e304bd21af9f0542ef68b06348442ceb7a96cfebe7705a258bbabd6ffcdfa64ed5a7fa1b326c14ebc28503fe92bb3ebf17fc7c24409f0c027f98ef614c4b70c7acaf271dca721267bc5527a1cdf7d868f03ac2f256e8564219174429ea7f03b7cdc465e3058ab8ad36a5d880f0eb5071a7ad49d45f5bf71dd277da4f9881b0e38e0a0af4b57f5867577f297dfe76d27cb6101ac02d04d1ee73855e7caf1c8a1e184a6744fd0e76b7a52fd37123dacbfe3fdbdf07956e17c6ae02368d50632f7bd262af662a68ae1ceddb9ddec81e01cba8053b256f79a834813a5b485a8acf6ad23714340a097d0a383a44457679e2c44dd1fbe2b11966bfa3521bc6728b5ab5f98fbb6a869f2361b8acd2baa186ec56f10d6cf30736e4f14ce07f173f4c4cdd8d27c33dcad28fd74aaa45776ab9085bc569d450ddc9007559d1f8a6b076b7633d9604039483e3a097e411215701de14f7f81286befb1361966863975e42401f1390f283bf3387f628dabdc9153fb0735752995788affa21eabb091fe868506c95880b494f1a50e9411ca8ac8240b93cbd40adc46e57e0387a4ea5a3c0ad75df2fb2bff168f406474f65cd5f3127c51ad7bec57e8d322e0448fc16e7d5dbef5686ff9bb26814fcd096e8c07f77776b87384f3d837002ec764d63253e0053a88d3ba8a6cd9fb71e268c51b55129e86197df954c924db944e2e25a66a6e7a9dd59247dfa9deb2fd6de7c056e134595910b1c55d46d6549ef946b166b5b01ca546bd89695210d9974c1b9e985ba64258b2144843ea527895034ee1265bfee4e30f6224366fb120791fa06b5940edfe8019e210ae80d579dcaa78fe7f18518b7e7c119b519c126c33d02ca46ccabdb8b2ebab6e37bd9f41a5912b0e649baa9bb8d861a526dccc39c9bbda6edb99cdb2627676811ac4ce95b1cd081317ef4f7f30865ece55e773780be9d8da2f0739a99156619f2a416dabf37205f948eb7de35df92df3ca1cb0845e065aa217c07d2264d9703cfd4fb0d6031cf4771385801275af9924243f202c86a43f676e123b4d3d05e9e5668d4d271a591abebcd656eb4077ae147da4aa0c470ea12b5cc8980b3a81d3403858f0c02f584e0b393bf767510646ecbbcffd61365dd6f08f5337a0395fd7014bb059bb5cef6fb1432e044338f5d5858b849aea493886f3257dc39d0137dc71e26171478c6344c227b0699399efb2ddd746fac7afe835361a1930c050dd8cf85a820f80ab58ae3495d0bf82868bce1792045ac83f1a3bdf55eb473b11753f0efa24b95c412f48f9e936a12928a64fe6d1440cfcdfbb4b49353d5f6d508005efe6b1c734ae25506f0394eb6dab929f60c75644a62b560fa1c5ea3f68fa836e47893297a0366ca21b340656f2393e21f0f1923155e4973ebf01dba99ba64183a3f06b14ae201e5919b1aa1d12ab200105d47d1c8d8b9f4f6784afe8c33cfde38a7c6677dcfc8b9e6289ca264700a2e1cd0b5eda408d38c6ca0320a36e1fd48b3ab4f2d02c28ab2419546f6872390d1a517e15bbcb9dc5b47b1665bc9a6cb6ff3a5eb0602f38776e3d5d83f86162a37fbc2bb1147eb57433abb35c19c2a45ba51024ad9b89c0f699abfbda25d6070e56e64a7b5ba6ccb6e746804c2318349ac401f1e48cffcb8dfb523b44c02a3a83a9656eab45227be19aa23ad72521430ac6ee77a6cde9a748b9ba5186b8ddd9621b577c091dfb14dad9bd29c15dae4946f0c71e6697ea375654644d7075e8316c288524457c616c00db7db501b8b968bfcf3cc5b027e312ecba46ae514aea22050fd98b73d3209808e88820fb43be790cbf2b5732190fff91889842f29336cc6ae1bda72cead5d3572da632f6fc8b1080efef0ccc34dd6d81bfda5f9343290db8f8bf69e51f66c05802922b8fbc957822e270eecb3cc614a88461516d410d020adb7cdef8cca73dd992bb05f59f22f335f3a8052c7143c6f37f6cd7aac37ad8fb3860d0121ed1e7a7f728ff338a5f25ee1fa2a6a426b8863c783a64948f6c1e1a205f868cded638528120dffed1c15217058bc6eff2d195b0b3b262a47acf1105e89e35627e7dd1ec7ed3c3825719ab566a75e98b89c953b30f7f9dd953e42a075e92db792ed6f47325ba4f84ab976d606b12a9dda1bd80a4fab4b4563ae16fb8969080d2bcf7ae5e25ef740dbeab6a27e4f68b42a88145e867fc1d0c58ff41086d86819be844660f335e72826b9dca2ab27ae04edd2142756261bc89f925c93271d1713e122964ac40c1a6093ee96a915cf92a8e834f752971b43c48a257b57938c6fe0b48c865641009114a308dfae59547d356c5c932dc4c2c852c4cafc5e5030f06ef6d0e7c8dcd829d8b18d34f5425fd53b03e377d0bb14b9867a5b36c303f9db8626fb47e4ab78e90212efc131d447f1ff6bc174da68feea4c8604474d1d3214cdb6ea845c95c670e7c671f2ac6160d4bc0ec4f646b986aade9585e28024ca4f1353256703b098fbbb0f1988efe1950776868ea54ffd5610f0fbee61b06d5d9cdfef01daf1b57359be9878dec26971e474ebc6430581887763cdb881d858f610fa94dcd5c2f9581bd7abaa23641df7bed29761f9aba7370cee87a9cf9f2afd6c06cb039321df31773754351d5887f4791a92135062ef2ef12f0e350fe7a6ad86d0daf1b486da192bf80071b5474a48009070b4859fe0c630bb480fce8dc934c74ce2ca91050727f2371a75d20a5c41fcb4bbcda903c682d15d0a4268c48138fd273170e9f7fadeccb44fd2de65eb12e58f528846cf2bc08fbd12e20f6fe8a2367dc9df9e0e05185d443fb538a6879e84dce2f25abc5363411c1f7301a5326f61f5aa2c3e75b94979e38488e4c47a4f34917fdc892f8756e244b2d0fa2af5d9fed563ea13ce610a56fe0d1110d10829cc9b0d095ce52ddb9ea06b89883c4c4dc70c5bc8e40bf3bdc09cd5686ee780b68ec996291805b9f335b115ed4b994d4bae50bf07a82c074b3057a7fd80d651559b4622a40ee2cd2b77dae56a31a7c28f01a5ea0df933c0e66ecd1ac5d88d370e62b058ef4f3a059ceaf187f4813c1fb262be14b71479d5c7ee567424b27ab57839b41ef6f1e82c22ef91ca7609fa287455ddd652176d0fe1e2644ca1eb7e9313e1e55b28c280133ea256dacb2a71f15af29a1cd9df87d0bcd533c5f19169c466d8a3d95c0c62d1ce6b210e3c1389d6780d7baccabb37947c3bf3aa5369430508aa64d821fdf98972cff43fba4ce8be56d55b8dc6c034a77058f4337301cf71e6d96a96d8c47ccc4c57dc02545e2e031cf782869265f2ac9dc364125d35e99c200ad5d0510f9d929d9b5622b8e893b2cfcae1eefe2dc89eb5af45ca9ddd2c2e55c135df6556a582173c2b4509aded34ed358b48fc96c35626ea0f52c32c9a18a603ed6b2e137abc384a3c859b9d30844709f68d2db249922174959bab599f33de84fa1f0e63bbb1e2b6750044c3dd77217e04b8b218d11aa35944c7e8cf90eea28fe8f126b4069b0110f09a5b89912b19e3bcd710ae9d9a3e36a2c78f1274b9f1eb634ea278bf4d01781d43947f5b9d8bb2ba6d6b62148ac3068697e14770cad22cc94956cd81b965d946351318eb7c022fdbd4c219f7d756271ec61d2037faa3e628e3d496ebf5372e6bd643e3ea72a864a24935e7ca95299097913bfbe6cc88f8d974e04eb955eebae2d813036858fe16b4020fc7c9e60b8120df067c63e2e76149bd772db41e80f96115c4c7d2062d2b2420f233b8b0d8154a3c55dab61600894294a5e1c39ff4c65599db0079e8e0b35fb6503906377dd420a4f3831ee612119f20a5326b3cc8d28983e744a6eae22e4401c83a6a07e1395e72801b14321367a0a8c694e5fc917e3faef8909120f04779f5ea5a75ed0ace2bb572e9c1a08dca3bab264bb3398530be9749cb32271cb0001a631b4d863c58ec41f50e34d3d740d1b15f538f367a55d1fda0db6fe520b0021b61c3dd639bca25e82191abfe5de88b0496422c367aad01e9f08e1192ed3e0301c35b66a8ca6af45c68aca7504a4b3dff5698b899004b9fd3a4c4d15ed904a5a33018e23591e16536425608700362efd60009503cb500c1db2bee3abab742ee107eacd52577742dd5179439b9df97c1fde46eff0408b4189f9a83ded30e8210d4fa978e616259d9b3cfc49d99f2b583b1c6eecba4d3d3f7d88d8735edb1f4ff9e4d6dd121ec0e9c27611373fbac180ea9586ebc81440d7e67206d4f02679eb09d3f8aea0ce6a1d103db93a83723ddb3a7096516ad384654c653a26d09aa8457695d6fded5ad1bcc69f0e9ff10ac16d00e7e1fcd2f3cb1583105d2865552dbf883c9306d3390be1db9cc31ca127408a129d0675fdf738c648072b2bdc5e219bf9bb234dd6b6c1d7491fc6448037d518ca57a82a96820e7ad89dbc34a320204b8a8626a227c9f86e2811a158fa48aa34efb71b2d1480ed817794e2dd20b9fde36b1eff7e0a663d4c6defb63e9dea0e026c2a66aa10c54e24b70b80106e11d82e1f7e4af0329959f46539a815067cce7f7f122b3ed7c1c4432ecb6381d9bb0a6b892788fd4d726f4b3fd54f0691d4efab277cb028c511a4d2361ef3319a027d13800dd101f95968f49d441d7844f8caa32557e0229dfd33c3aac03547c88eb839403e1109d938258ea48497189801a4aa4fd9cc9aca6a7379fb3ad97d3e23ff0189848e827ae699b24d94c190599bdf384bf18ae2dfeb1cf6d16495d51ba5aeefe8c83465569ad9e42d66a33534b8f1dc5e6e6666d629c2bb4be5d2e8c64b37d6bf0c1c709e5c00d29a3970f962172d4b618fcf1a19dd27083835c8afaaf548dbeafbf4f156d1334c1380bfa2c30f32be3cdf41c2e5b5365beb76d0df5d61ca3e1ea1e0c126c77483fb31d5f51512c5b82378f9c4804743572ea186cdf2a6c728b270905e87f5d817a7442bea821fe9f7db89bc8cb8ad8e7cfdeec8faa21603d0a3124a12704c648223af628edf938e8ce1d6fdd142749ae2ee45820aa92d19c7e2ded0c638c38acef0a71a1ee6e3e6e345af1adb47167793077cf7f5f3b751ae8f26a6dea98b5445f00c7209380fa4d9a700705696cbce70244479b1c6c376d90c44a03ba149f83d248aaf29575980d9608f29af48eb002659579d73dfdd0e7872356c43b1b7d6894a5a75c3f387a838be9108ef74697193e2e751e64e9fd6b577f486925315bf02a4fb4279c6fb8f6b68f171e2e89f977b533ebc9bf0e49b3c69501d1889b78c8f6ba1bb5107227a9495c6cc875335325d11a7767925356e504e4a2b219e88a57b68d00a8106acdba6efddada4ef75774fbc9a215ca4800", 0x1000, 0x6}, {&(0x7f0000001340)="5f9ec5cb42d56e4b018600b19bc5ae7be712b8db3bfc090a7b19e0b2cd7306aac78f02c965a887777ac88da1e0da89", 0x2f, 0x1ff}, {&(0x7f0000001380)="15f701ace9c685db651a768568389cae352891b4f4f7bf05e6d8a54f34e0c1ba51334e7781269b00fc05bc441ccbeaa8166ac20fc674e28d50da2fd69d267b80f82c1178188f2e76e69a4aaf070358574874e423ed026be3531c1b413c7b3e7f28921cd4d2383d60e1bbf28b487ab722dd822b702e7667d701c80673ac06e1f65eb6823ad66c88dc283b4e1f673e144f2c0e99adfc6f3424c62d8754e8a8", 0x9e, 0x3}, {&(0x7f0000001440)="76ae35417cc8692a0e8905280cfd00d6434feb590dda1317fb5864f78c692d4cef48612c", 0x24, 0xfffffffffffffffd}], 0x800002, &(0x7f0000001800)={[{@acl='acl'}, {@user_xattr='user_xattr'}, {@noacl='noacl'}, {@nouser_xattr='nouser_xattr'}, {@noacl='noacl'}, {@acl='acl'}, {@user_xattr='user_xattr'}], [{@subj_role={'subj_role', 0x3d, '}loself{lo'}}, {@obj_user={'obj_user', 0x3d, ']\xa6$system,#securitysystemproc'}}, {@obj_type={'obj_type', 0x3d, 'jfs\x00'}}, {@audit='audit'}, {@fsname={'fsname', 0x3d, '\x9b'}}, {@fowner_gt={'fowner>', r0}}, {@uid_lt={'uid<', r2}}]}) getsockopt$bt_hci(r3, 0x0, 0x3, &(0x7f0000001b40)=""/38, &(0x7f0000001b80)=0x26) 04:23:00 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x3f000000, 0x0, 0x0, 0x0, 0x0) 04:23:00 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x28000000, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:00 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x8864}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) [ 2434.955956][T12595] R10: 0000000000000008 R11: 0000000000000206 R12: 0000000000000005 [ 2434.963926][T12595] R13: 0000000000000008 R14: 00000000004db990 R15: 0000000000000004 04:23:00 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x3f000000, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2435.153858][T12612] JFS: Cannot determine volume size 04:23:00 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x8906}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:00 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0xf6ffffff, 0x0, 0x0, 0x0, 0x0) 04:23:00 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xf6ffffff, 0x0) 04:23:00 executing program 1 (fault-call:3 fault-nth:36): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) [ 2435.197379][T12612] JFS: Cannot determine volume size [ 2435.210565][T12612] jfs: Unrecognized mount option "seclabel" or missing value [ 2435.313916][T12626] FAULT_INJECTION: forcing a failure. [ 2435.313916][T12626] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2435.327173][T12626] CPU: 1 PID: 12626 Comm: syz-executor1 Not tainted 5.0.0-rc2-next-20190115 #12 [ 2435.336200][T12626] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2435.346290][T12626] Call Trace: [ 2435.349590][T12626] dump_stack+0x1db/0x2d0 [ 2435.353944][T12626] ? dump_stack_print_info.cold+0x20/0x20 04:23:00 executing program 0: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000080)='/dev/sequencer\x00', 0x42, 0x0) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000180)=ANY=[@ANYBLOB='resize,resize,resize=0x0000000000000000,discard=0x0000000000000200,iocharset=macroman,resize=0x0000000000000400,fscontext=system_u,euid=', @ANYRESDEC=0x0, @ANYBLOB="2c0001410bf3b83fb1d4099cefbabcd1d27773e2f70a961caac8c7dee9f2edd358a12f0a0000000000009e0be775744c36407e13dfc01903ad9a67ce4264539668220214ff6a4bc7d2a7dc2e2eb8367053570fada8de761aaaa82c178550bab956ecca0804d95036eda69372d6883ef2a779ce51bad872e40e4d3ff50cb0a2ad295b"]) r1 = syz_open_dev$radio(&(0x7f0000000040)='/dev/radio#\x00', 0x1, 0x2) ioctl$KVM_GET_ONE_REG(r0, 0x4010aeab, &(0x7f00000002c0)={0x2, 0x70c7}) ioctl$KVM_SET_GUEST_DEBUG(r1, 0x4048ae9b, &(0x7f0000000100)={0x2, 0x0, [0x1, 0x8, 0x6, 0x73, 0x2, 0x801, 0x4753, 0x6]}) 04:23:00 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0xf000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:00 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x40000000, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:00 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0xfcfdffff, 0x0, 0x0, 0x0, 0x0) [ 2435.359677][T12626] ? __lock_acquire+0x572/0x4a10 [ 2435.364635][T12626] should_fail.cold+0xa/0x14 [ 2435.369253][T12626] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2435.375082][T12626] ? mark_held_locks+0x100/0x100 [ 2435.380042][T12626] ? save_stack+0x45/0xd0 [ 2435.384387][T12626] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2435.390204][T12626] ? kasan_kmalloc+0x9/0x10 [ 2435.394713][T12626] ? __kmalloc_track_caller+0x158/0x740 [ 2435.400284][T12626] ? memdup_user+0x26/0xb0 [ 2435.404703][T12626] ? strndup_user+0x77/0xd0 [ 2435.409210][T12626] ? ksys_mount+0x7b/0x150 [ 2435.413634][T12626] should_fail_alloc_page+0x50/0x60 [ 2435.418830][T12626] __alloc_pages_nodemask+0x323/0xdc0 [ 2435.424200][T12626] ? add_lock_to_list.isra.0+0x450/0x450 [ 2435.429842][T12626] ? __alloc_pages_slowpath+0x2c60/0x2c60 [ 2435.435565][T12626] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2435.441826][T12626] ? ___might_sleep+0x1e7/0x310 [ 2435.446684][T12626] ? trace_hardirqs_off+0xb8/0x310 [ 2435.451800][T12626] cache_grow_begin+0x9c/0x8c0 [ 2435.456563][T12626] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2435.462804][T12626] ? check_preemption_disabled+0x48/0x290 [ 2435.468526][T12626] kmem_cache_alloc_trace+0x67f/0x760 [ 2435.473913][T12626] copy_mount_options+0x5c/0x440 [ 2435.478851][T12626] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2435.485096][T12626] ksys_mount+0xa7/0x150 [ 2435.489347][T12626] __x64_sys_mount+0xbe/0x150 [ 2435.494048][T12626] do_syscall_64+0x1a3/0x800 [ 2435.498642][T12626] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2435.504287][T12626] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2435.510011][T12626] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2435.515566][T12626] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2435.521459][T12626] RIP: 0033:0x45a93a [ 2435.525354][T12626] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ed 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ca 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2435.544952][T12626] RSP: 002b:00007f18dfc72a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2435.553362][T12626] RAX: ffffffffffffffda RBX: 00007f18dfc72b30 RCX: 000000000045a93a [ 2435.561334][T12626] RDX: 00007f18dfc72ad0 RSI: 0000000020000380 RDI: 00007f18dfc72af0 [ 2435.569308][T12626] RBP: 0000000020000380 R08: 00007f18dfc72b30 R09: 00007f18dfc72ad0 [ 2435.577379][T12626] R10: 0000000000000008 R11: 0000000000000206 R12: 0000000000000005 [ 2435.585351][T12626] R13: 0000000000000008 R14: 00000000004db990 R15: 0000000000000004 04:23:01 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0xf0ffff}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:01 executing program 1 (fault-call:3 fault-nth:37): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) 04:23:01 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x43050000, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:01 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0xfdfdffff, 0x0, 0x0, 0x0, 0x0) 04:23:01 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xf9fdffff, 0x0) [ 2435.758216][T12639] JFS: Cannot determine volume size [ 2435.765446][T12639] JFS: Cannot determine volume size [ 2435.774446][T12639] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:23:01 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x1000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:01 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x800e0000, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:01 executing program 0: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000280)={{{@in6=@remote, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in6=@dev}}, &(0x7f0000000040)=0xe8) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000380)={[{@resize='resize'}, {@errors_continue='errors=continue'}, {@uid={'uid', 0x3d, r0}}, {@discard_size={'discard', 0x3d, 0x200}}, {@iocharset={'iocharset', 0x3d, 'macroman'}}, {@errors_continue='errors=continue'}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@euid_eq={'euid'}}]}) 04:23:01 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0xfeffffff, 0x0, 0x0, 0x0, 0x0) [ 2436.007092][T12646] FAULT_INJECTION: forcing a failure. [ 2436.007092][T12646] name failslab, interval 1, probability 0, space 0, times 0 [ 2436.029212][T12646] CPU: 1 PID: 12646 Comm: syz-executor1 Not tainted 5.0.0-rc2-next-20190115 #12 [ 2436.038275][T12646] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2436.048336][T12646] Call Trace: [ 2436.051642][T12646] dump_stack+0x1db/0x2d0 [ 2436.055986][T12646] ? dump_stack_print_info.cold+0x20/0x20 [ 2436.061714][T12646] ? trace_hardirqs_on+0xbd/0x310 [ 2436.066753][T12646] ? kasan_check_read+0x11/0x20 [ 2436.071621][T12646] ? finish_task_switch+0x1e9/0xac0 [ 2436.076831][T12646] ? trace_hardirqs_off_caller+0x300/0x300 [ 2436.082659][T12646] should_fail.cold+0xa/0x14 [ 2436.087279][T12646] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2436.093112][T12646] ? ___might_sleep+0x1e7/0x310 [ 2436.097975][T12646] ? arch_local_save_flags+0x50/0x50 [ 2436.103275][T12646] ? __switch_to_asm+0x34/0x70 [ 2436.108044][T12646] ? __switch_to_asm+0x34/0x70 [ 2436.112815][T12646] ? __switch_to_asm+0x40/0x70 [ 2436.117582][T12646] ? __switch_to_asm+0x34/0x70 [ 2436.122359][T12646] __should_failslab+0x121/0x190 [ 2436.127310][T12646] should_failslab+0x9/0x14 [ 2436.131842][T12646] kmem_cache_alloc+0x2be/0x710 [ 2436.136717][T12646] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2436.142183][T12646] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2436.147479][T12646] getname_flags+0xd6/0x5b0 [ 2436.151992][T12646] user_path_at_empty+0x2f/0x50 [ 2436.156856][T12646] do_mount+0x168/0x2fa0 [ 2436.161104][T12646] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2436.166571][T12646] ? copy_mount_string+0x40/0x40 [ 2436.171510][T12646] ? retint_kernel+0x2d/0x2d [ 2436.176121][T12646] ? copy_mount_options+0x248/0x440 [ 2436.181325][T12646] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2436.187566][T12646] ? copy_mount_options+0x30e/0x440 [ 2436.192770][T12646] ksys_mount+0xdb/0x150 [ 2436.197022][T12646] __x64_sys_mount+0xbe/0x150 [ 2436.201705][T12646] do_syscall_64+0x1a3/0x800 [ 2436.206299][T12646] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2436.212362][T12646] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2436.218094][T12646] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2436.223649][T12646] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2436.229540][T12646] RIP: 0033:0x45a93a [ 2436.233436][T12646] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ed 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ca 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 04:23:01 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x2000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:01 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x80350000, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2436.253037][T12646] RSP: 002b:00007f18dfc72a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2436.261451][T12646] RAX: ffffffffffffffda RBX: 00007f18dfc72b30 RCX: 000000000045a93a [ 2436.269439][T12646] RDX: 00007f18dfc72ad0 RSI: 0000000020000380 RDI: 00007f18dfc72af0 [ 2436.277415][T12646] RBP: 0000000020000380 R08: 00007f18dfc72b30 R09: 00007f18dfc72ad0 [ 2436.285385][T12646] R10: 0000000000000008 R11: 0000000000000206 R12: 0000000000000005 [ 2436.293372][T12646] R13: 0000000000000008 R14: 00000000004db990 R15: 0000000000000004 04:23:01 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xfbffffff, 0x0) [ 2436.342730][T12662] JFS: Cannot determine volume size 04:23:01 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x3000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) [ 2436.371517][T12662] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:23:01 executing program 1 (fault-call:3 fault-nth:38): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) 04:23:01 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x81000000, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:02 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0xfffffdfc, 0x0, 0x0, 0x0, 0x0) 04:23:02 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000001700)={[{@resize='resize'}, {@resize='resize'}, {@resize_size={'resize'}}, {@discard_size={'discard', 0x3d, 0x200}}, {@iocharset={'iocharset', 0x3d, 'macroman'}}, {@resize_size={'resize', 0x3d, 0x400}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@euid_eq={'euid'}}]}) r0 = syz_open_dev$sndpcmc(&(0x7f0000000080)='/dev/snd/pcmC#D#c\x00', 0xef, 0x4a180) ioctl$KVM_SMI(r0, 0xaeb7) openat$vicodec1(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video37\x00', 0x2, 0x0) 04:23:02 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x4000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:02 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xfcfdffff, 0x0) 04:23:02 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x86ddffff, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2436.616613][T12683] JFS: Cannot determine volume size [ 2436.647849][T12680] FAULT_INJECTION: forcing a failure. [ 2436.647849][T12680] name failslab, interval 1, probability 0, space 0, times 0 [ 2436.653863][T12683] JFS: Cannot determine volume size 04:23:02 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0xfffffdfd, 0x0, 0x0, 0x0, 0x0) [ 2436.690953][T12683] jfs: Unrecognized mount option "fscontext=system_u" or missing value [ 2436.722912][T12680] CPU: 0 PID: 12680 Comm: syz-executor1 Not tainted 5.0.0-rc2-next-20190115 #12 [ 2436.731979][T12680] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2436.742034][T12680] Call Trace: [ 2436.745340][T12680] dump_stack+0x1db/0x2d0 [ 2436.749687][T12680] ? dump_stack_print_info.cold+0x20/0x20 [ 2436.755430][T12680] ? retint_kernel+0x2d/0x2d [ 2436.760641][T12680] should_fail.cold+0xa/0x14 [ 2436.765242][T12680] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2436.771067][T12680] ? ___might_sleep+0x1e7/0x310 [ 2436.775927][T12680] ? arch_local_save_flags+0x50/0x50 [ 2436.781227][T12680] __should_failslab+0x121/0x190 [ 2436.786182][T12680] should_failslab+0x9/0x14 [ 2436.790781][T12680] kmem_cache_alloc_trace+0x2d1/0x760 [ 2436.796189][T12680] ? __sanitizer_cov_trace_pc+0x2b/0x50 [ 2436.802767][T12680] alloc_fs_context+0x5a/0x640 [ 2436.807546][T12680] fs_context_for_mount+0x25/0x30 [ 2436.812578][T12680] do_mount+0x15bb/0x2fa0 [ 2436.816916][T12680] ? calibrate_delay.cold+0x47b/0x539 [ 2436.822301][T12680] ? copy_mount_string+0x40/0x40 [ 2436.827244][T12680] ? retint_kernel+0x2d/0x2d [ 2436.831857][T12680] ? copy_mount_options+0x248/0x440 [ 2436.837072][T12680] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2436.843322][T12680] ? copy_mount_options+0x30e/0x440 [ 2436.848539][T12680] ksys_mount+0xdb/0x150 [ 2436.852795][T12680] __x64_sys_mount+0xbe/0x150 [ 2436.857477][T12680] do_syscall_64+0x1a3/0x800 [ 2436.862076][T12680] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2436.868237][T12680] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2436.873992][T12680] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2436.879557][T12680] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2436.885449][T12680] RIP: 0033:0x45a93a [ 2436.889348][T12680] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ed 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ca 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2436.908954][T12680] RSP: 002b:00007f18dfc72a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2436.917374][T12680] RAX: ffffffffffffffda RBX: 00007f18dfc72b30 RCX: 000000000045a93a [ 2436.925379][T12680] RDX: 00007f18dfc72ad0 RSI: 0000000020000380 RDI: 00007f18dfc72af0 [ 2436.933360][T12680] RBP: 0000000020000380 R08: 00007f18dfc72b30 R09: 00007f18dfc72ad0 04:23:02 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x88470000, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:02 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x6000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) [ 2436.941340][T12680] R10: 0000000000000008 R11: 0000000000000206 R12: 0000000000000005 [ 2436.949313][T12680] R13: 0000000000000008 R14: 00000000004db990 R15: 0000000000000004 04:23:02 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x88480000, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:02 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0xfffffff6, 0x0, 0x0, 0x0, 0x0) 04:23:02 executing program 1 (fault-call:3 fault-nth:39): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) 04:23:02 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x7000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) [ 2437.180396][T12683] JFS: Cannot determine volume size [ 2437.185632][T12683] JFS: Cannot determine volume size 04:23:02 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xfdfdffff, 0x0) [ 2437.226041][T12683] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:23:02 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000001700)=ANY=[@ANYBLOB="726573697a652c72ff73697a652c726573697a653d3078303030303032303030303030303030fa302c646973636172643d30783030303030303030305bec81c53230302c696f636861727365743d6d6163726f6d616e2c726573697a653d3078303030306230303030303030303430302c"]) 04:23:02 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x88640000, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:02 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x8000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) [ 2437.330390][T12708] FAULT_INJECTION: forcing a failure. [ 2437.330390][T12708] name failslab, interval 1, probability 0, space 0, times 0 [ 2437.371143][T12708] CPU: 0 PID: 12708 Comm: syz-executor1 Not tainted 5.0.0-rc2-next-20190115 #12 [ 2437.380195][T12708] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2437.380204][T12708] Call Trace: [ 2437.380231][T12708] dump_stack+0x1db/0x2d0 [ 2437.380252][T12708] ? dump_stack_print_info.cold+0x20/0x20 [ 2437.380283][T12708] should_fail.cold+0xa/0x14 [ 2437.380307][T12708] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2437.380331][T12708] ? ___might_sleep+0x1e7/0x310 [ 2437.380350][T12708] ? arch_local_save_flags+0x50/0x50 [ 2437.408318][T12708] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2437.408338][T12708] ? retint_kernel+0x2d/0x2d [ 2437.408367][T12708] __should_failslab+0x121/0x190 [ 2437.439088][T12708] should_failslab+0x9/0x14 [ 2437.443605][T12708] kmem_cache_alloc+0x2be/0x710 [ 2437.448482][T12708] getname_kernel+0x53/0x370 [ 2437.453080][T12708] kern_path+0x20/0x40 [ 2437.457168][T12708] lookup_bdev+0x109/0x260 [ 2437.461589][T12708] ? blkdev_open+0x290/0x290 [ 2437.466192][T12708] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2437.471659][T12708] blkdev_get_by_path+0x21/0xd0 [ 2437.476522][T12708] mount_bdev+0x5d/0x3c0 [ 2437.480772][T12708] ? jfs_destroy_inode+0x2d0/0x2d0 [ 2437.485910][T12708] jfs_do_mount+0x35/0x40 [ 2437.490244][T12708] ? jfs_get_dquots+0x20/0x20 [ 2437.494924][T12708] legacy_get_tree+0xf2/0x200 [ 2437.499608][T12708] vfs_get_tree+0x123/0x450 [ 2437.504127][T12708] do_mount+0x1622/0x2fa0 [ 2437.508465][T12708] ? calibrate_delay.cold+0x47b/0x539 [ 2437.513853][T12708] ? copy_mount_string+0x40/0x40 [ 2437.518798][T12708] ? retint_kernel+0x2d/0x2d [ 2437.523400][T12708] ? copy_mount_options+0x234/0x440 [ 2437.528599][T12708] ? copy_mount_options+0x23a/0x440 [ 2437.533805][T12708] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2437.540143][T12708] ? copy_mount_options+0x30e/0x440 [ 2437.545346][T12708] ksys_mount+0xdb/0x150 [ 2437.549599][T12708] __x64_sys_mount+0xbe/0x150 [ 2437.554285][T12708] do_syscall_64+0x1a3/0x800 [ 2437.558884][T12708] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2437.564519][T12708] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2437.570248][T12708] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2437.575805][T12708] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2437.581697][T12708] RIP: 0033:0x45a93a [ 2437.585600][T12708] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ed 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ca 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2437.605202][T12708] RSP: 002b:00007f18dfc72a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2437.613615][T12708] RAX: ffffffffffffffda RBX: 00007f18dfc72b30 RCX: 000000000045a93a [ 2437.621611][T12708] RDX: 00007f18dfc72ad0 RSI: 0000000020000380 RDI: 00007f18dfc72af0 [ 2437.629587][T12708] RBP: 0000000020000380 R08: 00007f18dfc72b30 R09: 00007f18dfc72ad0 [ 2437.637559][T12708] R10: 0000000000000008 R11: 0000000000000206 R12: 0000000000000005 [ 2437.645531][T12708] R13: 0000000000000008 R14: 00000000004db990 R15: 0000000000000004 04:23:03 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x88a8ffff, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:03 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0xfffffffe, 0x0, 0x0, 0x0, 0x0) 04:23:03 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xfeffffff, 0x0) 04:23:03 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x8060000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:03 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x88caffff, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:03 executing program 1 (fault-call:3 fault-nth:40): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) [ 2437.790132][T12721] JFS: Cannot determine volume size [ 2437.802489][T12721] jfs: Unrecognized mount option "rÿsize" or missing value 04:23:03 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x89060000, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:03 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0xd000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:03 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x225c17d03, 0x0, 0x0, 0x0, 0x0) [ 2437.943214][T12733] FAULT_INJECTION: forcing a failure. [ 2437.943214][T12733] name failslab, interval 1, probability 0, space 0, times 0 [ 2437.977429][T12733] CPU: 1 PID: 12733 Comm: syz-executor1 Not tainted 5.0.0-rc2-next-20190115 #12 [ 2437.986496][T12733] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2437.986503][T12733] Call Trace: [ 2437.986531][T12733] dump_stack+0x1db/0x2d0 [ 2437.986552][T12733] ? dump_stack_print_info.cold+0x20/0x20 [ 2437.986576][T12733] ? save_stack+0x45/0xd0 [ 2438.014239][T12733] ? __kasan_kmalloc.constprop.0+0xcf/0xe0 [ 2438.014255][T12733] ? kasan_kmalloc+0x9/0x10 [ 2438.014279][T12733] ? legacy_init_fs_context+0x48/0xe0 [ 2438.029926][T12733] should_fail.cold+0xa/0x14 [ 2438.034533][T12733] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2438.040361][T12733] ? ___might_sleep+0x1e7/0x310 [ 2438.045219][T12733] ? arch_local_save_flags+0x50/0x50 [ 2438.050516][T12733] ? check_preemption_disabled+0x48/0x290 [ 2438.056246][T12733] __should_failslab+0x121/0x190 [ 2438.061189][T12733] should_failslab+0x9/0x14 [ 2438.065695][T12733] __kmalloc_track_caller+0x2d8/0x740 [ 2438.071083][T12733] ? legacy_init_fs_context+0x48/0xe0 [ 2438.076458][T12733] ? vfs_parse_fs_string+0x226/0x2b0 [ 2438.081751][T12733] kmemdup_nul+0x31/0xa0 [ 2438.086001][T12733] vfs_parse_fs_string+0x226/0x2b0 [ 2438.091121][T12733] ? vfs_parse_fs_param+0x4b0/0x4b0 [ 2438.096327][T12733] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2438.102567][T12733] ? alloc_fs_context+0x3bb/0x640 [ 2438.107602][T12733] do_mount+0x710/0x2fa0 [ 2438.111970][T12733] ? copy_mount_string+0x40/0x40 [ 2438.116909][T12733] ? kmem_cache_alloc_trace+0x354/0x760 [ 2438.122459][T12733] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2438.128702][T12733] ? _copy_from_user+0xdd/0x150 [ 2438.133573][T12733] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2438.139812][T12733] ? copy_mount_options+0x30e/0x440 [ 2438.145016][T12733] ksys_mount+0xdb/0x150 [ 2438.149267][T12733] __x64_sys_mount+0xbe/0x150 [ 2438.153954][T12733] do_syscall_64+0x1a3/0x800 [ 2438.158547][T12733] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2438.164185][T12733] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2438.169914][T12733] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2438.175473][T12733] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2438.181362][T12733] RIP: 0033:0x45a93a [ 2438.185262][T12733] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ed 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ca 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2438.204863][T12733] RSP: 002b:00007f18dfc72a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2438.213276][T12733] RAX: ffffffffffffffda RBX: 00007f18dfc72b30 RCX: 000000000045a93a [ 2438.221247][T12733] RDX: 00007f18dfc72ad0 RSI: 0000000020000380 RDI: 00007f18dfc72af0 [ 2438.229219][T12733] RBP: 0000000020000380 R08: 00007f18dfc72b30 R09: 00007f18dfc72ad0 04:23:03 executing program 0: prctl$PR_SVE_GET_VL(0x33, 0x9700) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000001700)={[{@resize='resize'}, {@resize='resize'}, {@resize_size={'resize'}}, {@discard_size={'discard', 0x3d, 0x200}}, {@iocharset={'iocharset', 0x3d, 'macroman'}}, {@resize_size={'resize', 0x3d, 0x400}}], [{@seclabel='seclabel'}, {@euid_eq={'euid'}}]}) 04:23:03 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0xffffa888, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2438.237215][T12733] R10: 0000000000000008 R11: 0000000000000206 R12: 0000000000000005 [ 2438.245184][T12733] R13: 0000000000000008 R14: 00000000004db990 R15: 0000000000000004 04:23:03 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x10000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:03 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xff0f0000, 0x0) 04:23:03 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0xffffca88, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:03 executing program 1 (fault-call:3 fault-nth:41): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) 04:23:03 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1000000000000, 0x0, 0x0, 0x0, 0x0) [ 2438.376896][T12745] JFS: Cannot determine volume size [ 2438.408915][T12745] JFS: Cannot determine volume size [ 2438.414177][T12745] jfs: Unrecognized mount option "seclabel" or missing value 04:23:04 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0xffffdd86, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:04 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x11000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:04 executing program 0: r0 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x3, 0x402) ioctl$SNDRV_SEQ_IOCTL_QUERY_SUBS(r0, 0xc058534f, &(0x7f00000001c0)={{0x37, 0xd97f}, 0x1, 0x4, 0x7, {0x6, 0x8}, 0x1000, 0x20}) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000100)={[{@resize='resize'}, {@errors_remount='errors=remount-ro'}, {@resize_size={'resize'}}, {@discard_size={'discard', 0x3d, 0x200}}, {@nodiscard='nodiscard'}, {@resize_size={'resize', 0x3d, 0x400}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@euid_eq={'euid'}}]}) 04:23:04 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0xfffff000, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:04 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x14000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) [ 2438.600397][T12755] FAULT_INJECTION: forcing a failure. [ 2438.600397][T12755] name failslab, interval 1, probability 0, space 0, times 0 [ 2438.631687][T12755] CPU: 0 PID: 12755 Comm: syz-executor1 Not tainted 5.0.0-rc2-next-20190115 #12 [ 2438.640739][T12755] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2438.650796][T12755] Call Trace: [ 2438.654098][T12755] dump_stack+0x1db/0x2d0 [ 2438.658439][T12755] ? dump_stack_print_info.cold+0x20/0x20 [ 2438.664166][T12755] ? __lock_is_held+0xb6/0x140 [ 2438.664217][T12755] should_fail.cold+0xa/0x14 [ 2438.673547][T12755] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2438.679368][T12755] ? ___might_sleep+0x1e7/0x310 [ 2438.684230][T12755] ? arch_local_save_flags+0x50/0x50 [ 2438.689513][T12755] ? lockdep_init_map+0x10c/0x5b0 [ 2438.694568][T12755] __should_failslab+0x121/0x190 [ 2438.699512][T12755] should_failslab+0x9/0x14 [ 2438.704026][T12755] __kmalloc+0x2dc/0x740 [ 2438.708276][T12755] ? retint_kernel+0x2d/0x2d [ 2438.713913][T12755] ? prealloc_shrinker+0xdf/0x340 [ 2438.718942][T12755] prealloc_shrinker+0xdf/0x340 [ 2438.723793][T12755] alloc_super+0x834/0xa10 [ 2438.728234][T12755] ? destroy_unused_super.part.0+0x110/0x110 [ 2438.734228][T12755] ? test_single_super+0x10/0x10 [ 2438.739165][T12755] ? test_single_super+0x10/0x10 [ 2438.744107][T12755] sget_userns+0x164/0x6c0 [ 2438.748528][T12755] ? kill_litter_super+0x60/0x60 [ 2438.753474][T12755] ? vfs_get_super+0x260/0x260 [ 2438.758236][T12755] ? security_capable+0x9b/0xd0 [ 2438.763093][T12755] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2438.769332][T12755] ? ns_capable_common+0x93/0x100 [ 2438.774360][T12755] ? test_single_super+0x10/0x10 [ 2438.779321][T12755] ? kill_litter_super+0x60/0x60 [ 2438.784258][T12755] sget+0x10c/0x150 [ 2438.788070][T12755] mount_bdev+0xff/0x3c0 [ 2438.792316][T12755] ? jfs_destroy_inode+0x2d0/0x2d0 [ 2438.797433][T12755] jfs_do_mount+0x35/0x40 [ 2438.801905][T12755] ? jfs_get_dquots+0x20/0x20 [ 2438.806592][T12755] legacy_get_tree+0xf2/0x200 [ 2438.811272][T12755] vfs_get_tree+0x123/0x450 [ 2438.815779][T12755] do_mount+0x1622/0x2fa0 [ 2438.820118][T12755] ? copy_mount_string+0x40/0x40 [ 2438.825057][T12755] ? kmem_cache_alloc_trace+0x354/0x760 [ 2438.830611][T12755] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2438.836868][T12755] ? _copy_from_user+0xdd/0x150 [ 2438.841760][T12755] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2438.848025][T12755] ? copy_mount_options+0x30e/0x440 [ 2438.853232][T12755] ksys_mount+0xdb/0x150 [ 2438.857480][T12755] __x64_sys_mount+0xbe/0x150 [ 2438.862252][T12755] do_syscall_64+0x1a3/0x800 [ 2438.866846][T12755] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2438.872497][T12755] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2438.878223][T12755] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2438.883782][T12755] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2438.889673][T12755] RIP: 0033:0x45a93a [ 2438.893568][T12755] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ed 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ca 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2438.913169][T12755] RSP: 002b:00007f18dfc72a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2438.921578][T12755] RAX: ffffffffffffffda RBX: 00007f18dfc72b30 RCX: 000000000045a93a [ 2438.929550][T12755] RDX: 00007f18dfc72ad0 RSI: 0000000020000380 RDI: 00007f18dfc72af0 [ 2438.937520][T12755] RBP: 0000000020000380 R08: 00007f18dfc72b30 R09: 00007f18dfc72ad0 [ 2438.945490][T12755] R10: 0000000000000008 R11: 0000000000000206 R12: 0000000000000005 [ 2438.953458][T12755] R13: 0000000000000008 R14: 00000000004db990 R15: 0000000000000004 04:23:04 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x40000000000000, 0x0, 0x0, 0x0, 0x0) 04:23:04 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xfffffdf9, 0x0) 04:23:04 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x1c000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) [ 2439.076328][T12768] JFS: Cannot determine volume size [ 2439.082997][T12768] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:23:04 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0xf0ffffffffffff, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:04 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x20000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:04 executing program 1 (fault-call:3 fault-nth:42): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) 04:23:04 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x100000000000000, 0x0, 0x0, 0x0, 0x0) 04:23:04 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x100000000000000, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2439.167445][T12778] JFS: Cannot determine volume size [ 2439.183886][T12778] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:23:04 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x3f000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:04 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000100)=ANY=[@ANYBLOB='resize,resize,resize=0x0000000000000000,discard=0x0000000000000200,iocharset=macroman,resize=0x0000000000000400,fscontext=system_u,euid=', @ANYRESDEC=0x0, @ANYBLOB="f29ae60000d99c4dee87433561e19fdc316e5b02a27b9ce33c4c6afb9ef431b13e7165f6dbcf7087302f5777219438557f13729a1cb2b6550ff810933d4f0800"]) 04:23:04 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xfffffdfc, 0x0) 04:23:04 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x200000000000000, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2439.347346][T12787] FAULT_INJECTION: forcing a failure. [ 2439.347346][T12787] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2439.360585][T12787] CPU: 0 PID: 12787 Comm: syz-executor1 Not tainted 5.0.0-rc2-next-20190115 #12 [ 2439.369606][T12787] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2439.379657][T12787] Call Trace: [ 2439.379685][T12787] dump_stack+0x1db/0x2d0 [ 2439.379707][T12787] ? dump_stack_print_info.cold+0x20/0x20 04:23:04 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x300000000000000, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2439.379726][T12787] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2439.379741][T12787] ? retint_kernel+0x2d/0x2d [ 2439.379760][T12787] ? trace_hardirqs_on_caller+0xc0/0x310 [ 2439.393066][T12787] should_fail.cold+0xa/0x14 [ 2439.393088][T12787] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2439.393109][T12787] ? trace_hardirqs_on_caller+0xc0/0x310 [ 2439.421528][T12795] JFS: Cannot determine volume size [ 2439.424574][T12787] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2439.424599][T12787] ? retint_kernel+0x2d/0x2d [ 2439.424622][T12787] should_fail_alloc_page+0x50/0x60 [ 2439.424642][T12787] __alloc_pages_nodemask+0x323/0xdc0 [ 2439.435147][T12795] JFS: Cannot determine volume size [ 2439.435275][T12787] ? __alloc_pages_slowpath+0x2c60/0x2c60 [ 2439.435293][T12787] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2439.435327][T12787] ? ___might_sleep+0x1e7/0x310 [ 2439.451590][T12795] jfs: Unrecognized mount option "fscontext=system_u" or missing value [ 2439.455632][T12787] ? trace_hardirqs_off+0xb8/0x310 [ 2439.455658][T12787] cache_grow_begin+0x9c/0x8c0 [ 2439.455675][T12787] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 04:23:05 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x200000000000000, 0x0, 0x0, 0x0, 0x0) [ 2439.455699][T12787] ? check_preemption_disabled+0x48/0x290 [ 2439.480720][T12787] kmem_cache_alloc+0x645/0x710 [ 2439.480745][T12787] getname_kernel+0x53/0x370 [ 2439.480760][T12787] kern_path+0x20/0x40 [ 2439.480777][T12787] lookup_bdev+0x109/0x260 [ 2439.480789][T12787] ? blkdev_open+0x290/0x290 [ 2439.480812][T12787] blkdev_get_by_path+0x21/0xd0 [ 2439.480838][T12787] mount_bdev+0x5d/0x3c0 [ 2439.490696][T12787] ? jfs_destroy_inode+0x2d0/0x2d0 [ 2439.490719][T12787] jfs_do_mount+0x35/0x40 04:23:05 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x43050000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:05 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x600000000000000, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2439.490736][T12787] ? jfs_get_dquots+0x20/0x20 [ 2439.490755][T12787] legacy_get_tree+0xf2/0x200 [ 2439.490770][T12787] vfs_get_tree+0x123/0x450 [ 2439.490790][T12787] do_mount+0x1622/0x2fa0 [ 2439.490807][T12787] ? calibrate_delay.cold+0x47b/0x539 [ 2439.490826][T12787] ? copy_mount_string+0x40/0x40 [ 2439.490841][T12787] ? retint_kernel+0x2d/0x2d [ 2439.490865][T12787] ? copy_mount_options+0x248/0x440 [ 2439.525246][T12787] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2439.525269][T12787] ? copy_mount_options+0x30e/0x440 [ 2439.525292][T12787] ksys_mount+0xdb/0x150 [ 2439.525312][T12787] __x64_sys_mount+0xbe/0x150 [ 2439.525338][T12787] do_syscall_64+0x1a3/0x800 [ 2439.534397][T12787] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2439.534416][T12787] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2439.534439][T12787] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2439.534466][T12787] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2439.534479][T12787] RIP: 0033:0x45a93a [ 2439.534496][T12787] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ed 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ca 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2439.543929][T12787] RSP: 002b:00007f18dfc72a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2439.543955][T12787] RAX: ffffffffffffffda RBX: 00007f18dfc72b30 RCX: 000000000045a93a [ 2439.543966][T12787] RDX: 00007f18dfc72ad0 RSI: 0000000020000380 RDI: 00007f18dfc72af0 [ 2439.543975][T12787] RBP: 0000000020000380 R08: 00007f18dfc72b30 R09: 00007f18dfc72ad0 [ 2439.543985][T12787] R10: 0000000000000008 R11: 0000000000000206 R12: 0000000000000005 [ 2439.543994][T12787] R13: 0000000000000008 R14: 00000000004db990 R15: 0000000000000004 04:23:05 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000001700)={[{@resize='resize'}, {@resize='resize'}, {@resize_size={'resize'}}, {@discard_size={'discard', 0x3d, 0x200}}, {@iocharset={'iocharset', 0x3d, 'macroman'}}, {@resize_size={'resize', 0x3d, 0x400}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@euid_eq={'euid'}}]}) mlockall(0x7) 04:23:05 executing program 1 (fault-call:3 fault-nth:43): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) 04:23:05 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x60000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:05 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x700000000000000, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:05 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xfffffdfd, 0x0) 04:23:05 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x300000000000000, 0x0, 0x0, 0x0, 0x0) [ 2439.911203][T12811] JFS: Cannot determine volume size [ 2439.916447][T12811] JFS: Cannot determine volume size [ 2439.972429][T12820] FAULT_INJECTION: forcing a failure. [ 2439.972429][T12820] name failslab, interval 1, probability 0, space 0, times 0 [ 2440.008368][T12820] CPU: 1 PID: 12820 Comm: syz-executor1 Not tainted 5.0.0-rc2-next-20190115 #12 [ 2440.012165][T12811] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:23:05 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x800000000000000, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:05 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x37dc12502000000, 0x0, 0x0, 0x0, 0x0) [ 2440.017410][T12820] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2440.017417][T12820] Call Trace: [ 2440.017442][T12820] dump_stack+0x1db/0x2d0 [ 2440.017463][T12820] ? dump_stack_print_info.cold+0x20/0x20 [ 2440.035736][T12820] ? __lock_is_held+0xb6/0x140 [ 2440.053806][T12820] should_fail.cold+0xa/0x14 [ 2440.058408][T12820] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2440.058437][T12820] ? ___might_sleep+0x1e7/0x310 [ 2440.069072][T12820] ? arch_local_save_flags+0x50/0x50 [ 2440.074360][T12820] ? lockdep_init_map+0x10c/0x5b0 [ 2440.079394][T12820] ? lockdep_init_map+0x10c/0x5b0 [ 2440.084427][T12820] __should_failslab+0x121/0x190 [ 2440.089367][T12820] should_failslab+0x9/0x14 [ 2440.093869][T12820] __kmalloc+0x2dc/0x740 [ 2440.098124][T12820] ? __init_waitqueue_head+0x92/0x150 [ 2440.103496][T12820] ? init_wait_entry+0x1c0/0x1c0 [ 2440.108432][T12820] ? prealloc_shrinker+0xdf/0x340 [ 2440.113464][T12820] prealloc_shrinker+0xdf/0x340 [ 2440.118315][T12820] alloc_super+0x834/0xa10 [ 2440.122734][T12820] ? destroy_unused_super.part.0+0x110/0x110 [ 2440.128735][T12820] ? test_single_super+0x10/0x10 [ 2440.133688][T12820] ? test_single_super+0x10/0x10 [ 2440.138625][T12820] sget_userns+0x164/0x6c0 [ 2440.143038][T12820] ? kill_litter_super+0x60/0x60 [ 2440.147975][T12820] ? vfs_get_super+0x260/0x260 [ 2440.152735][T12820] ? security_capable+0x9b/0xd0 [ 2440.157598][T12820] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2440.163837][T12820] ? ns_capable_common+0x93/0x100 [ 2440.168881][T12820] ? test_single_super+0x10/0x10 [ 2440.173825][T12820] ? kill_litter_super+0x60/0x60 [ 2440.178759][T12820] sget+0x10c/0x150 [ 2440.182581][T12820] mount_bdev+0xff/0x3c0 [ 2440.186825][T12820] ? jfs_destroy_inode+0x2d0/0x2d0 [ 2440.191939][T12820] jfs_do_mount+0x35/0x40 [ 2440.196265][T12820] ? jfs_get_dquots+0x20/0x20 [ 2440.200947][T12820] legacy_get_tree+0xf2/0x200 [ 2440.205632][T12820] vfs_get_tree+0x123/0x450 [ 2440.210139][T12820] do_mount+0x1622/0x2fa0 [ 2440.214480][T12820] ? copy_mount_string+0x40/0x40 [ 2440.219421][T12820] ? kmem_cache_alloc_trace+0x354/0x760 [ 2440.224966][T12820] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2440.231207][T12820] ? _copy_from_user+0xdd/0x150 [ 2440.236064][T12820] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2440.242304][T12820] ? copy_mount_options+0x30e/0x440 [ 2440.247507][T12820] ksys_mount+0xdb/0x150 [ 2440.251753][T12820] __x64_sys_mount+0xbe/0x150 [ 2440.256439][T12820] do_syscall_64+0x1a3/0x800 [ 2440.261032][T12820] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2440.266664][T12820] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2440.272391][T12820] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2440.277946][T12820] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2440.283833][T12820] RIP: 0033:0x45a93a [ 2440.287744][T12820] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ed 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ca 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2440.307346][T12820] RSP: 002b:00007f18dfc72a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2440.315765][T12820] RAX: ffffffffffffffda RBX: 00007f18dfc72b30 RCX: 000000000045a93a 04:23:05 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x800e0000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) [ 2440.323736][T12820] RDX: 00007f18dfc72ad0 RSI: 0000000020000380 RDI: 00007f18dfc72af0 [ 2440.331708][T12820] RBP: 0000000020000380 R08: 00007f18dfc72b30 R09: 00007f18dfc72ad0 [ 2440.339677][T12820] R10: 0000000000000008 R11: 0000000000000206 R12: 0000000000000005 [ 2440.347645][T12820] R13: 0000000000000008 R14: 00000000004db990 R15: 0000000000000004 04:23:06 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x806000000000000, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:06 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xffffff7f, 0x0) 04:23:06 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x400000000000000, 0x0, 0x0, 0x0, 0x0) [ 2440.480573][T12811] JFS: Cannot determine volume size [ 2440.500645][T12811] JFS: Cannot determine volume size [ 2440.558693][T12811] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:23:06 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000100)=ANY=[@ANYBLOB='resize,resize,resize=0x0000000000000000,discard=0x0000000000000200,iocharset=macroman,resize=0x0000000000000400,fscontext=system_u,euid=', @ANYRESDEC=0x0, @ANYBLOB="2c00b3fcaeddf8ada10bc6ab1758df79f61ca586238f10d277d3ff3ca9f2e4403b86a423d4894374e4659d3240646ac981eb3ad0"]) 04:23:06 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x80350000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:06 executing program 1 (fault-call:3 fault-nth:44): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) 04:23:06 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x800000000000000, 0x0, 0x0, 0x0, 0x0) 04:23:06 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0xd00000000000000, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:06 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x1000000000000000, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:06 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x81000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) [ 2440.824361][T12846] FAULT_INJECTION: forcing a failure. [ 2440.824361][T12846] name fail_page_alloc, interval 1, probability 0, space 0, times 0 [ 2440.837604][T12846] CPU: 0 PID: 12846 Comm: syz-executor1 Not tainted 5.0.0-rc2-next-20190115 #12 [ 2440.846629][T12846] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2440.857217][T12846] Call Trace: [ 2440.860523][T12846] dump_stack+0x1db/0x2d0 [ 2440.864874][T12846] ? dump_stack_print_info.cold+0x20/0x20 [ 2440.870607][T12846] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2440.876875][T12846] should_fail.cold+0xa/0x14 [ 2440.881473][T12846] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2440.887282][T12846] ? is_bpf_text_address+0xe4/0x170 [ 2440.892488][T12846] ? is_bpf_text_address+0xd3/0x170 [ 2440.897690][T12846] ? kernel_text_address+0x73/0xf0 [ 2440.902805][T12846] ? __kernel_text_address+0xd/0x40 [ 2440.908014][T12846] ? unwind_get_return_address+0x61/0xa0 [ 2440.908037][T12846] should_fail_alloc_page+0x50/0x60 [ 2440.908054][T12846] __alloc_pages_nodemask+0x323/0xdc0 [ 2440.908075][T12846] ? __alloc_pages_slowpath+0x2c60/0x2c60 [ 2440.929953][T12846] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2440.936215][T12846] ? ___might_sleep+0x1e7/0x310 [ 2440.936237][T12846] ? trace_hardirqs_off+0xb8/0x310 [ 2440.936261][T12846] cache_grow_begin+0x9c/0x8c0 [ 2440.950943][T12846] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2440.957195][T12846] ? check_preemption_disabled+0x48/0x290 [ 2440.962933][T12846] kmem_cache_alloc+0x645/0x710 [ 2440.967799][T12846] getname_kernel+0x53/0x370 [ 2440.972400][T12846] kern_path+0x20/0x40 [ 2440.976487][T12846] lookup_bdev+0x109/0x260 [ 2440.980940][T12846] ? blkdev_open+0x290/0x290 [ 2440.985540][T12846] blkdev_get_by_path+0x21/0xd0 [ 2440.990397][T12846] mount_bdev+0x5d/0x3c0 [ 2440.994650][T12846] ? jfs_destroy_inode+0x2d0/0x2d0 [ 2440.999773][T12846] jfs_do_mount+0x35/0x40 [ 2441.004107][T12846] ? jfs_get_dquots+0x20/0x20 [ 2441.008788][T12846] legacy_get_tree+0xf2/0x200 [ 2441.008810][T12846] vfs_get_tree+0x123/0x450 [ 2441.008842][T12846] do_mount+0x1622/0x2fa0 [ 2441.008862][T12846] ? calibrate_delay.cold+0x47b/0x539 [ 2441.008884][T12846] ? copy_mount_string+0x40/0x40 [ 2441.008901][T12846] ? retint_kernel+0x2d/0x2d [ 2441.008926][T12846] ? copy_mount_options+0x250/0x440 [ 2441.022407][T12846] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2441.022428][T12846] ? copy_mount_options+0x30e/0x440 [ 2441.022451][T12846] ksys_mount+0xdb/0x150 [ 2441.022471][T12846] __x64_sys_mount+0xbe/0x150 [ 2441.022489][T12846] ? do_syscall_64+0x19e/0x800 [ 2441.022505][T12846] do_syscall_64+0x1a3/0x800 04:23:06 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x1400000000000000, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:06 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x2000000000000000, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:06 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x3f00000000000000, 0x0, 0x0, 0x0, 0x0) 04:23:06 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xffffff8c, 0x0) [ 2441.022524][T12846] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2441.022540][T12846] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2441.022560][T12846] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2441.089222][T12846] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2441.095118][T12846] RIP: 0033:0x45a93a [ 2441.099013][T12846] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ed 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ca 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 04:23:06 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x86ddffff}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) [ 2441.118605][T12846] RSP: 002b:00007f18dfc72a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2441.118619][T12846] RAX: ffffffffffffffda RBX: 00007f18dfc72b30 RCX: 000000000045a93a [ 2441.118628][T12846] RDX: 00007f18dfc72ad0 RSI: 0000000020000380 RDI: 00007f18dfc72af0 [ 2441.118638][T12846] RBP: 0000000020000380 R08: 00007f18dfc72b30 R09: 00007f18dfc72ad0 [ 2441.118646][T12846] R10: 0000000000000008 R11: 0000000000000206 R12: 0000000000000005 [ 2441.118654][T12846] R13: 0000000000000008 R14: 00000000004db990 R15: 0000000000000004 [ 2441.248270][T12855] JFS: Cannot determine volume size [ 2441.272216][T12855] JFS: Cannot determine volume size [ 2441.277489][T12855] jfs: Unrecognized mount option "fscontext=system_u" or missing value [ 2441.455849][T12855] JFS: Cannot determine volume size [ 2441.473183][T12855] JFS: Cannot determine volume size [ 2441.490536][T12855] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:23:07 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x20000000000004, &(0x7f0000001700)={[{@resize='resize'}, {@resize='resize'}, {@resize_size={'resize'}}, {@discard_size={'discard', 0x3d, 0x200}}, {@iocharset={'iocharset', 0x3d, 'macroman'}}, {@resize_size={'resize', 0x3d, 0x400}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@euid_eq={'euid'}}]}) syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0xffff, 0x8800) 04:23:07 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x2800000000000000, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:07 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0xf6ffffff00000000, 0x0, 0x0, 0x0, 0x0) 04:23:07 executing program 1 (fault-call:3 fault-nth:45): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) 04:23:07 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x88470000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:07 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xfffffff4, 0x0) 04:23:07 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x3f00000000000000, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:07 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x88480000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:07 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x4000000000000000, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2441.721939][T12881] FAULT_INJECTION: forcing a failure. [ 2441.721939][T12881] name failslab, interval 1, probability 0, space 0, times 0 04:23:07 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x88640000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) [ 2441.770955][T12881] CPU: 1 PID: 12881 Comm: syz-executor1 Not tainted 5.0.0-rc2-next-20190115 #12 [ 2441.780009][T12881] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2441.790072][T12881] Call Trace: [ 2441.793381][T12881] dump_stack+0x1db/0x2d0 [ 2441.798116][T12881] ? dump_stack_print_info.cold+0x20/0x20 [ 2441.803839][T12881] ? __kmalloc+0x15c/0x740 [ 2441.808264][T12881] ? __list_lru_init+0x13f/0x850 [ 2441.813258][T12881] ? alloc_super+0x8c3/0xa10 [ 2441.817843][T12881] ? sget_userns+0x164/0x6c0 [ 2441.822444][T12881] ? sget+0x10c/0x150 [ 2441.826431][T12881] ? jfs_do_mount+0x35/0x40 [ 2441.830956][T12881] should_fail.cold+0xa/0x14 [ 2441.835645][T12881] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2441.841463][T12881] ? ___might_sleep+0x1e7/0x310 [ 2441.846317][T12881] ? arch_local_save_flags+0x50/0x50 [ 2441.851604][T12881] ? check_preemption_disabled+0x48/0x290 [ 2441.857339][T12881] __should_failslab+0x121/0x190 [ 2441.862284][T12881] should_failslab+0x9/0x14 [ 2441.866795][T12881] kmem_cache_alloc_node_trace+0x270/0x720 [ 2441.872634][T12881] __kmalloc_node+0x3d/0x70 [ 2441.877145][T12881] kvmalloc_node+0x68/0x100 [ 2441.881655][T12881] __list_lru_init+0x5d5/0x850 [ 2441.886421][T12881] ? list_lru_destroy+0x520/0x520 [ 2441.891447][T12881] ? down_read+0x120/0x120 [ 2441.895874][T12881] ? init_wait_entry+0x1c0/0x1c0 [ 2441.900813][T12881] ? prealloc_shrinker+0xdf/0x340 [ 2441.905856][T12881] alloc_super+0x8c3/0xa10 [ 2441.910278][T12881] ? destroy_unused_super.part.0+0x110/0x110 [ 2441.916270][T12881] ? test_single_super+0x10/0x10 [ 2441.921255][T12881] ? test_single_super+0x10/0x10 [ 2441.926195][T12881] sget_userns+0x164/0x6c0 [ 2441.930611][T12881] ? kill_litter_super+0x60/0x60 [ 2441.935576][T12881] ? vfs_get_super+0x260/0x260 [ 2441.940338][T12881] ? security_capable+0x9b/0xd0 [ 2441.945192][T12881] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2441.951431][T12881] ? ns_capable_common+0x93/0x100 [ 2441.956464][T12881] ? test_single_super+0x10/0x10 [ 2441.961400][T12881] ? kill_litter_super+0x60/0x60 [ 2441.966839][T12881] sget+0x10c/0x150 [ 2441.970656][T12881] mount_bdev+0xff/0x3c0 [ 2441.974899][T12881] ? jfs_destroy_inode+0x2d0/0x2d0 [ 2441.980013][T12881] jfs_do_mount+0x35/0x40 [ 2441.984345][T12881] ? jfs_get_dquots+0x20/0x20 [ 2441.989025][T12881] legacy_get_tree+0xf2/0x200 [ 2441.993706][T12881] vfs_get_tree+0x123/0x450 [ 2441.998212][T12881] do_mount+0x1622/0x2fa0 [ 2442.002557][T12881] ? copy_mount_string+0x40/0x40 [ 2442.007496][T12881] ? kmem_cache_alloc_trace+0x354/0x760 [ 2442.013043][T12881] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2442.019282][T12881] ? _copy_from_user+0xdd/0x150 [ 2442.024138][T12881] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2442.030378][T12881] ? copy_mount_options+0x30e/0x440 [ 2442.035582][T12881] ksys_mount+0xdb/0x150 [ 2442.039833][T12881] __x64_sys_mount+0xbe/0x150 [ 2442.044524][T12881] do_syscall_64+0x1a3/0x800 [ 2442.049122][T12881] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2442.054777][T12881] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2442.060500][T12881] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2442.066056][T12881] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2442.071962][T12881] RIP: 0033:0x45a93a [ 2442.075877][T12881] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ed 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ca 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2442.095475][T12881] RSP: 002b:00007f18dfc72a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2442.103919][T12881] RAX: ffffffffffffffda RBX: 00007f18dfc72b30 RCX: 000000000045a93a [ 2442.111893][T12881] RDX: 00007f18dfc72ad0 RSI: 0000000020000380 RDI: 00007f18dfc72af0 04:23:07 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0xfcfdffff00000000, 0x0, 0x0, 0x0, 0x0) [ 2442.119861][T12881] RBP: 0000000020000380 R08: 00007f18dfc72b30 R09: 00007f18dfc72ad0 [ 2442.127830][T12881] R10: 0000000000000008 R11: 0000000000000206 R12: 0000000000000005 [ 2442.135796][T12881] R13: 0000000000000008 R14: 00000000004db990 R15: 0000000000000004 04:23:07 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xfffffff5, 0x0) 04:23:07 executing program 0: r0 = syz_open_dev$mice(&(0x7f0000000080)='/dev/input/mice\x00', 0x0, 0x0) getsockopt$IP_VS_SO_GET_VERSION(r0, 0x0, 0x480, &(0x7f0000000240), &(0x7f0000000280)=0x40) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000100)=ANY=[@ANYBLOB='resize,resize,resize=0x0000000000000000,discard=0x0000000000000200,iocharset=macroman,resize=0x0000000000000400,fscontext=system_u,euid=', @ANYRESDEC=0x0, @ANYBLOB="040058e6453a4742fa57e6f8686a2dca0e0737e8b4314896a45f12b1c0e0febf67"]) r1 = openat$vim2m(0xffffffffffffff9c, &(0x7f0000000040)='/dev/video35\x00', 0x2, 0x0) ioctl$VIDIOC_S_MODULATOR(r1, 0x40445637, &(0x7f00000001c0)={0x7f, "419860546794ca6cfbb2f5bbe23501e30fb5327b935994e828cb3d7fe21a6fd8", 0x130, 0x7fff, 0x0, 0x6, 0x4}) r2 = syz_genetlink_get_family_id$tipc(&(0x7f0000000300)='TIPC\x00') sendmsg$TIPC_CMD_SET_NODE_ADDR(r0, &(0x7f00000003c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x24, r2, 0x100, 0x70bd28, 0x25dfdbfc, {{}, 0x0, 0x8001, 0x0, {0x8, 0x11, 0x8}}, ["", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x4000}, 0x4000000) ioctl$DRM_IOCTL_MODE_GETCRTC(r0, 0xc06864a1, &(0x7f0000000440)={&(0x7f0000000400)=[0xd9a], 0x1, 0x6000000000000, 0x9, 0x7, 0x3, 0xcbe60, {0x6216, 0x20, 0x20cf, 0xf48b, 0x10000, 0x2, 0x6, 0x437, 0x7, 0x5, 0x0, 0x2, 0xaa3a, 0x5, "717d251bca4eb6f5b7ad221f61d8fde51f9976a51d4e3f6b3ef3d5ef2761a503"}}) 04:23:07 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x4305000000000000, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:07 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x88a8ffff}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:07 executing program 1 (fault-call:3 fault-nth:46): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) 04:23:07 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0xfdfdffff00000000, 0x0, 0x0, 0x0, 0x0) 04:23:07 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x88caffff}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:07 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x800e000000000000, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:08 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xfffffff6, 0x0) 04:23:08 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0xfeffffff00000000, 0x0, 0x0, 0x0, 0x0) [ 2442.571884][T12909] FAULT_INJECTION: forcing a failure. [ 2442.571884][T12909] name failslab, interval 1, probability 0, space 0, times 0 [ 2442.601505][T12909] CPU: 0 PID: 12909 Comm: syz-executor1 Not tainted 5.0.0-rc2-next-20190115 #12 [ 2442.610563][T12909] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2442.610663][T12909] Call Trace: [ 2442.610688][T12909] dump_stack+0x1db/0x2d0 [ 2442.610719][T12909] ? dump_stack_print_info.cold+0x20/0x20 [ 2442.634104][T12909] should_fail.cold+0xa/0x14 [ 2442.638719][T12909] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2442.644543][T12909] ? ___might_sleep+0x1e7/0x310 [ 2442.649400][T12909] ? arch_local_save_flags+0x50/0x50 [ 2442.654719][T12909] ? check_preemption_disabled+0x48/0x290 [ 2442.660448][T12909] __should_failslab+0x121/0x190 [ 2442.660471][T12909] should_failslab+0x9/0x14 [ 2442.660489][T12909] kmem_cache_alloc_trace+0x2d1/0x760 [ 2442.660510][T12909] ? rcu_read_lock_sched_held+0x110/0x130 [ 2442.660529][T12909] __memcg_init_list_lru_node+0xef/0x2e0 [ 2442.660547][T12909] ? kvfree_rcu+0x20/0x20 [ 2442.660562][T12909] ? kasan_kmalloc+0x9/0x10 [ 2442.660576][T12909] ? __kmalloc_node+0x4e/0x70 [ 2442.660595][T12909] __list_lru_init+0x4d9/0x850 [ 2442.704902][T12909] ? list_lru_destroy+0x520/0x520 [ 2442.709937][T12909] ? prealloc_shrinker+0x1b5/0x340 [ 2442.715073][T12909] alloc_super+0x8c3/0xa10 [ 2442.719500][T12909] ? destroy_unused_super.part.0+0x110/0x110 [ 2442.725498][T12909] ? test_single_super+0x10/0x10 [ 2442.730438][T12909] ? test_single_super+0x10/0x10 [ 2442.735374][T12909] sget_userns+0x164/0x6c0 [ 2442.739793][T12909] ? kill_litter_super+0x60/0x60 [ 2442.744738][T12909] ? vfs_get_super+0x260/0x260 [ 2442.749503][T12909] ? security_capable+0x9b/0xd0 [ 2442.754361][T12909] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2442.760601][T12909] ? ns_capable_common+0x93/0x100 [ 2442.765631][T12909] ? test_single_super+0x10/0x10 [ 2442.770569][T12909] ? kill_litter_super+0x60/0x60 [ 2442.775504][T12909] sget+0x10c/0x150 [ 2442.779318][T12909] mount_bdev+0xff/0x3c0 [ 2442.783561][T12909] ? jfs_destroy_inode+0x2d0/0x2d0 [ 2442.788675][T12909] jfs_do_mount+0x35/0x40 [ 2442.793016][T12909] ? jfs_get_dquots+0x20/0x20 [ 2442.797702][T12909] legacy_get_tree+0xf2/0x200 [ 2442.802382][T12909] vfs_get_tree+0x123/0x450 [ 2442.806892][T12909] do_mount+0x1622/0x2fa0 [ 2442.811233][T12909] ? calibrate_delay.cold+0x47b/0x539 [ 2442.816615][T12909] ? copy_mount_string+0x40/0x40 [ 2442.821555][T12909] ? retint_kernel+0x2d/0x2d [ 2442.826153][T12909] ? copy_mount_options+0x223/0x440 [ 2442.831374][T12909] ? copy_mount_options+0x22f/0x440 [ 2442.836570][T12909] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2442.842811][T12909] ? copy_mount_options+0x30e/0x440 [ 2442.848026][T12909] ksys_mount+0xdb/0x150 [ 2442.852283][T12909] __x64_sys_mount+0xbe/0x150 [ 2442.856965][T12909] do_syscall_64+0x1a3/0x800 [ 2442.861564][T12909] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2442.867227][T12909] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2442.872956][T12909] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2442.878519][T12909] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2442.884414][T12909] RIP: 0033:0x45a93a [ 2442.888312][T12909] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ed 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ca 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2442.907914][T12909] RSP: 002b:00007f18dfc72a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 04:23:08 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x89060000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:08 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x8035000000000000, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2442.916333][T12909] RAX: ffffffffffffffda RBX: 00007f18dfc72b30 RCX: 000000000045a93a [ 2442.924304][T12909] RDX: 00007f18dfc72ad0 RSI: 0000000020000380 RDI: 00007f18dfc72af0 [ 2442.932275][T12909] RBP: 0000000020000380 R08: 00007f18dfc72b30 R09: 00007f18dfc72ad0 [ 2442.940244][T12909] R10: 0000000000000008 R11: 0000000000000206 R12: 0000000000000005 [ 2442.948216][T12909] R13: 0000000000000008 R14: 00000000004db990 R15: 0000000000000004 [ 2442.990309][T12919] JFS: Cannot determine volume size [ 2443.009192][T12919] JFS: Cannot determine volume size [ 2443.017880][T12919] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:23:08 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x8100000000000000, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2443.117373][T12923] JFS: Cannot determine volume size [ 2443.122784][T12923] JFS: Cannot determine volume size [ 2443.128079][T12923] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:23:08 executing program 0: getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000100)={{{@in=@multicast1, @in6=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in6=@local}}, &(0x7f0000000200)=0xe8) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000380)=ANY=[@ANYBLOB="666f776e65723d87aa3b7986104d674d2a4b0b3abbb077966e7d3dc4d194e06f44d8b96e1ef088cd2cfef9a59d65a4e51c76a42f2cf1fa99526f74da4c659e56113548c716909140338c467b0c46c340979864bc802b08eefd43223e9f1a8ab5a1c71c046b382763a5928f65038176808c687abca441d59170c4bf3d04cc9e25a6157613137adb63be95383cbd26369710a8369a44e893fb6866242f3904", @ANYRESDEC=r0, @ANYBLOB=',euid=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r1 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$DRM_IOCTL_SET_VERSION(r1, 0xc0106407, &(0x7f00000002c0)={0x0, 0x8000, 0x420, 0x8000}) r2 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.net/syz1\x00', 0x200002, 0x0) fsetxattr$security_ima(r2, &(0x7f00000000c0)='security.ima\x00', &(0x7f0000000240)=@md5={0x1, "6feb02117924a75e8725545bf7ca0600"}, 0x11, 0x2) 04:23:08 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xfffffffb, 0x0) 04:23:08 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffff00000000, 0x0, 0x0, 0x0, 0x0) 04:23:08 executing program 1 (fault-call:3 fault-nth:47): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) 04:23:08 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0xfeffffff}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:08 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x86ddffff00000000, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:08 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x8847000000000000, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:08 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0xffffa888}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:08 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 04:23:09 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x8848000000000000, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:09 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xfffffffe, 0x0) [ 2443.461169][T12942] FAULT_INJECTION: forcing a failure. [ 2443.461169][T12942] name failslab, interval 1, probability 0, space 0, times 0 [ 2443.478132][T12947] jfs: Unrecognized mount option "fowner=‡ª;y†MgM*K :»°w–n}=ÄÑ”àoDعnðˆÍ" or missing value [ 2443.528530][T12942] CPU: 0 PID: 12942 Comm: syz-executor1 Not tainted 5.0.0-rc2-next-20190115 #12 [ 2443.537589][T12942] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2443.537597][T12942] Call Trace: [ 2443.537624][T12942] dump_stack+0x1db/0x2d0 [ 2443.537655][T12942] ? dump_stack_print_info.cold+0x20/0x20 [ 2443.537675][T12942] ? retint_kernel+0x2d/0x2d [ 2443.537697][T12942] should_fail.cold+0xa/0x14 [ 2443.570245][T12942] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2443.576063][T12942] ? ___might_sleep+0x1e7/0x310 [ 2443.576082][T12942] ? arch_local_save_flags+0x50/0x50 [ 2443.576105][T12942] ? check_preemption_disabled+0x48/0x290 [ 2443.576129][T12942] __should_failslab+0x121/0x190 [ 2443.586236][T12942] should_failslab+0x9/0x14 [ 2443.586257][T12942] kmem_cache_alloc_node_trace+0x270/0x720 [ 2443.586284][T12942] __kmalloc_node+0x3d/0x70 [ 2443.586310][T12942] kvmalloc_node+0x68/0x100 [ 2443.596931][T12942] __list_lru_init+0x5d5/0x850 [ 2443.596952][T12942] ? list_lru_destroy+0x520/0x520 [ 2443.596971][T12942] ? down_read+0x120/0x120 [ 2443.597008][T12942] alloc_super+0x8c3/0xa10 [ 2443.634821][T12942] ? destroy_unused_super.part.0+0x110/0x110 [ 2443.640821][T12942] ? test_single_super+0x10/0x10 [ 2443.645766][T12942] ? test_single_super+0x10/0x10 [ 2443.650710][T12942] sget_userns+0x164/0x6c0 [ 2443.655135][T12942] ? kill_litter_super+0x60/0x60 [ 2443.660076][T12942] ? vfs_get_super+0x260/0x260 [ 2443.664838][T12942] ? security_capable+0x9b/0xd0 [ 2443.669694][T12942] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2443.675936][T12942] ? ns_capable_common+0x93/0x100 [ 2443.680971][T12942] ? test_single_super+0x10/0x10 [ 2443.685912][T12942] ? kill_litter_super+0x60/0x60 [ 2443.690850][T12942] sget+0x10c/0x150 [ 2443.694669][T12942] mount_bdev+0xff/0x3c0 [ 2443.698916][T12942] ? jfs_destroy_inode+0x2d0/0x2d0 [ 2443.704035][T12942] jfs_do_mount+0x35/0x40 [ 2443.708369][T12942] ? jfs_get_dquots+0x20/0x20 [ 2443.713054][T12942] legacy_get_tree+0xf2/0x200 [ 2443.717739][T12942] vfs_get_tree+0x123/0x450 [ 2443.722274][T12942] do_mount+0x1622/0x2fa0 [ 2443.726605][T12942] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 2443.732089][T12942] ? copy_mount_string+0x40/0x40 [ 2443.737037][T12942] ? copy_mount_options+0x1de/0x440 [ 2443.742238][T12942] ? __sanitizer_cov_trace_pc+0x48/0x50 [ 2443.747788][T12942] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2443.754033][T12942] ? copy_mount_options+0x30e/0x440 [ 2443.759243][T12942] ksys_mount+0xdb/0x150 [ 2443.763497][T12942] __x64_sys_mount+0xbe/0x150 [ 2443.768183][T12942] ? do_syscall_64+0xbc/0x800 [ 2443.772863][T12942] do_syscall_64+0x1a3/0x800 [ 2443.777459][T12942] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2443.783102][T12942] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2443.788829][T12942] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2443.794385][T12942] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2443.800771][T12942] RIP: 0033:0x45a93a [ 2443.804668][T12942] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ed 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ca 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 04:23:09 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0xffffca88}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) [ 2443.824273][T12942] RSP: 002b:00007f18dfc72a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2443.832864][T12942] RAX: ffffffffffffffda RBX: 00007f18dfc72b30 RCX: 000000000045a93a [ 2443.840842][T12942] RDX: 00007f18dfc72ad0 RSI: 0000000020000380 RDI: 00007f18dfc72af0 [ 2443.848818][T12942] RBP: 0000000020000380 R08: 00007f18dfc72b30 R09: 00007f18dfc72ad0 [ 2443.856789][T12942] R10: 0000000000000008 R11: 0000000000000206 R12: 0000000000000005 [ 2443.864783][T12942] R13: 0000000000000008 R14: 00000000004db990 R15: 0000000000000004 04:23:09 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, 0x0, 0x0, 0x0) 04:23:09 executing program 0: r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rtc0\x00', 0x80000, 0x0) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000080), 0x4) r1 = syz_open_dev$usbmon(&(0x7f0000000000)='/dev/usbmon#\x00', 0x80000001, 0x100) ioctl$PERF_EVENT_IOC_REFRESH(r1, 0x2402, 0x0) 04:23:09 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0xffffdd86}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:09 executing program 1 (fault-call:3 fault-nth:48): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) 04:23:09 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x8864000000000000, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:09 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3, 0x0, 0x0, 0x0) 04:23:09 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000000, 0x0) 04:23:09 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0xfffff000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:09 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x537, 0x0, 0x1, &(0x7f0000000300)=ANY=[]) r0 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000040)='cpuacct.usage_all\x00', 0x0, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_WRITE(r0, 0xc008551b, &(0x7f0000000080)={0xfffffffffffffc00, 0x10, [0xff, 0x8001, 0x8001, 0x80]}) 04:23:09 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x88a8ffff00000000, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:09 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:09 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x4, 0x0, 0x0, 0x0) 04:23:09 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000001700)={[{@resize='resize'}, {@resize='resize'}, {@resize_size={'resize'}}, {@discard_size={'discard', 0x3d, 0x200}}, {@iocharset={'iocharset', 0x3d, 'macroman'}}, {@resize_size={'resize', 0x3d, 0x400}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@euid_eq={'euid'}}]}) r0 = gettid() ioprio_get$pid(0x3, r0) 04:23:09 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x88caffff00000000, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2444.300746][T12974] FAULT_INJECTION: forcing a failure. [ 2444.300746][T12974] name failslab, interval 1, probability 0, space 0, times 0 04:23:09 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xedc000000000, 0x0) [ 2444.387372][T12974] CPU: 1 PID: 12974 Comm: syz-executor1 Not tainted 5.0.0-rc2-next-20190115 #12 [ 2444.396459][T12974] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2444.406531][T12974] Call Trace: [ 2444.409856][T12974] dump_stack+0x1db/0x2d0 [ 2444.414217][T12974] ? dump_stack_print_info.cold+0x20/0x20 [ 2444.419975][T12974] should_fail.cold+0xa/0x14 [ 2444.424595][T12974] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 2444.430426][T12974] ? ___might_sleep+0x1e7/0x310 [ 2444.435301][T12974] ? arch_local_save_flags+0x50/0x50 [ 2444.440617][T12974] ? check_preemption_disabled+0x48/0x290 [ 2444.446354][T12974] __should_failslab+0x121/0x190 [ 2444.451299][T12974] should_failslab+0x9/0x14 [ 2444.455805][T12974] kmem_cache_alloc_trace+0x2d1/0x760 [ 2444.461190][T12974] ? rcu_read_lock_sched_held+0x110/0x130 [ 2444.466919][T12974] __memcg_init_list_lru_node+0xef/0x2e0 [ 2444.472558][T12974] ? kvfree_rcu+0x20/0x20 [ 2444.476897][T12974] ? kasan_kmalloc+0x9/0x10 [ 2444.481405][T12974] ? __kmalloc_node+0x4e/0x70 [ 2444.486105][T12974] __list_lru_init+0x4d9/0x850 [ 2444.490876][T12974] ? list_lru_destroy+0x520/0x520 [ 2444.495901][T12974] ? down_read+0x120/0x120 [ 2444.500320][T12974] ? init_wait_entry+0x1c0/0x1c0 [ 2444.505257][T12974] ? prealloc_shrinker+0xdf/0x340 [ 2444.510292][T12974] alloc_super+0x8c3/0xa10 [ 2444.514715][T12974] ? destroy_unused_super.part.0+0x110/0x110 [ 2444.520711][T12974] ? test_single_super+0x10/0x10 [ 2444.525651][T12974] ? test_single_super+0x10/0x10 [ 2444.530593][T12974] sget_userns+0x164/0x6c0 [ 2444.535011][T12974] ? kill_litter_super+0x60/0x60 [ 2444.539949][T12974] ? vfs_get_super+0x260/0x260 [ 2444.544710][T12974] ? security_capable+0x9b/0xd0 [ 2444.549574][T12974] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2444.555829][T12974] ? ns_capable_common+0x93/0x100 [ 2444.560877][T12974] ? test_single_super+0x10/0x10 [ 2444.565997][T12974] ? kill_litter_super+0x60/0x60 [ 2444.572116][T12974] sget+0x10c/0x150 [ 2444.576163][T12974] mount_bdev+0xff/0x3c0 [ 2444.580532][T12974] ? jfs_destroy_inode+0x2d0/0x2d0 [ 2444.585886][T12974] jfs_do_mount+0x35/0x40 [ 2444.590228][T12974] ? jfs_get_dquots+0x20/0x20 [ 2444.596002][T12974] legacy_get_tree+0xf2/0x200 [ 2444.600788][T12974] vfs_get_tree+0x123/0x450 [ 2444.605321][T12974] do_mount+0x1622/0x2fa0 [ 2444.609905][T12974] ? copy_mount_string+0x40/0x40 [ 2444.614872][T12974] ? kmem_cache_alloc_trace+0x354/0x760 [ 2444.620864][T12974] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2444.627126][T12974] ? _copy_from_user+0xdd/0x150 [ 2444.631986][T12974] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2444.638524][T12974] ? copy_mount_options+0x30e/0x440 [ 2444.643741][T12974] ksys_mount+0xdb/0x150 [ 2444.648000][T12974] __x64_sys_mount+0xbe/0x150 [ 2444.652815][T12974] do_syscall_64+0x1a3/0x800 [ 2444.657503][T12974] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2444.663157][T12974] ? prepare_exit_to_usermode+0x232/0x3b0 [ 2444.668902][T12974] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2444.674470][T12974] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2444.680366][T12974] RIP: 0033:0x45a93a [ 2444.684267][T12974] Code: b8 a6 00 00 00 0f 05 48 3d 01 f0 ff ff 0f 83 ed 8c fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 49 89 ca b8 a5 00 00 00 0f 05 <48> 3d 01 f0 ff ff 0f 83 ca 8c fb ff c3 66 0f 1f 84 00 00 00 00 00 [ 2444.703868][T12974] RSP: 002b:00007f18dfc72a88 EFLAGS: 00000206 ORIG_RAX: 00000000000000a5 [ 2444.712283][T12974] RAX: ffffffffffffffda RBX: 00007f18dfc72b30 RCX: 000000000045a93a [ 2444.720251][T12974] RDX: 00007f18dfc72ad0 RSI: 0000000020000380 RDI: 00007f18dfc72af0 [ 2444.728224][T12974] RBP: 0000000020000380 R08: 00007f18dfc72b30 R09: 00007f18dfc72ad0 [ 2444.736195][T12974] R10: 0000000000000008 R11: 0000000000000206 R12: 0000000000000005 [ 2444.744163][T12974] R13: 0000000000000008 R14: 00000000004db990 R15: 0000000000000004 [ 2444.762388][T12995] JFS: Cannot determine volume size [ 2444.781208][T12995] JFS: Cannot determine volume size [ 2444.786545][T12995] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:23:10 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) 04:23:10 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0xf0ffffffffffff}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:10 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x8, 0x0, 0x0, 0x0) 04:23:10 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x8906000000000000, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:10 executing program 0: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x400000, 0x0) r1 = geteuid() syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000001180)={[{@resize='resize'}, {@resize='resize'}, {@errors_continue='errors=continue'}, {@discard_size={'discard', 0x3d, 0x200}}, {@iocharset={'iocharset', 0x3d, 'macroman'}}, {@resize_size={'resize', 0x3d, 0x400}}], [{@euid_lt={'euid<', r1}}, {@measure='measure'}]}) ioctl$EVIOCGABS20(r0, 0x80184560, &(0x7f0000000100)=""/4096) 04:23:10 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000000000, 0x0) 04:23:10 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x300, 0x0, 0x0, 0x0) 04:23:10 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0xfffffffffffff000, 0x2000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2445.061938][T13009] JFS: Cannot determine volume size 04:23:10 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) [ 2445.099767][T13009] JFS: Cannot determine volume size [ 2445.105794][T13009] jfs: Unrecognized mount option "euid<00000000000000000000" or missing value 04:23:10 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3f00, 0x0, 0x0, 0x0) 04:23:10 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2002, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2445.250029][T13014] JFS: Cannot determine volume size [ 2445.255267][T13014] JFS: Cannot determine volume size 04:23:10 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) [ 2445.300075][T13014] jfs: Unrecognized mount option "euid<00000000000000000000" or missing value 04:23:11 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='%fs\x00', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) 04:23:11 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2003, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:11 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x4000, 0x0, 0x0, 0x0) 04:23:11 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x7ffffffffffff, 0x0) 04:23:11 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000001700)=ANY=[@ANYBLOB='resize,resize,resize=0x0000000000000000,discard=0x0000000000000200,iocharset=m\x00\x00roman,resize=0x000000M000000400,fsiostem_u,euid=\x00\x00\x00\x00\x00\x00\x00\x00', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f00000006c0)={{{@in, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@broadcast}, 0x0, @in=@empty}}, &(0x7f00000007c0)=0xe8) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000800)={0x0, 0x0}, &(0x7f0000000840)=0xc) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x3, 0x8, &(0x7f0000000600)=[{&(0x7f0000000100)="047cafd0ef094ff39a8a0e0c4e4497f92fc53078d57843167c85098f232a5a843d5ccd42c0", 0x25, 0x733f}, {&(0x7f0000000140)="4e8e8c053133184784ac010e822a7e640efe91086d2089cdd91b236d6e8783fab84e6176f5a47b7272e4ec812cb8e1401efe213c29f15aafd328d699f83c155197b649b723c552dfebafeeb764f4671192bc07", 0x53, 0x4}, {&(0x7f00000001c0)="66bba8dd26f8bc11da6177b64d206df9f0df5d926d4af52536be3c774ffaf478a0ff161ae554abdb3c0ae3050e7cda594fbb49c72f5aa63e82d462ee0a72bc47b49b80a220a620234079d5eed36513891054887e60db037ec0e9b08a53b28218292cc27a92cdbd28ce8fbf0c333636a58a574ac439d6f5873407327acf59235ed2dd3233b097ddabc05ab640dfa699c9f80469a7ad542398d8bd", 0x9a, 0x2c7}, {&(0x7f0000000280)="f98b39e859acf2a8c264e8173fb2538d5090099de3364c15a0e88cef1b909909d8e9df962683c8d07adf4f9fee5abea476b191cb67598f03330337dfca78c227409c4644bb4334bddcd38f0436e716d40b1675222bd88e94b88f1c3af414692bddbf8d241615d0d1918a8154cc30186dfe64b0fc6c3bf5552dcaa6caf670bc8e415d6c591d149cf13a0435b7b25d52b0641ae47bb46fc68a637193a69f1f2505fea310a0a5608dc91e23cba75c8d87b86631cd77fb131e0bb6035d230c80acae03b0932e85f29d77aa264a", 0xcb, 0x6e5}, {&(0x7f0000000380)="25c9fbaa07acbfc2d683d97321f3342a528070a05e2d9daeb1b82673f1e38a49a7325b2b3ea87b71ed0b1468643b970d2506dad86d05", 0x36, 0xfff}, {&(0x7f00000003c0)="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", 0xfa, 0x4}, {&(0x7f00000004c0)="bdb05a8c5b852faec98f7f6cf17b9589f3dac5c9506a4f6c25caca2441f7723dc3e2dcde1706dd1e02981d220c8827e81d556dbe5dde636115e44daac13e507f9459fac127d3f3d37bb99ca7e56653c0792594c8614332b417364da530f788387572ad8f672c57afe28018d26f82e4a3f554b039ee0a93007fe02d4df9821a6c02", 0x81, 0x80000000}, {&(0x7f0000000580)="693b15a417d2c904e2ca301263f3677fa57e771efd06c06ceda786891696c730f24ca4b4762d33560e453e918a627b726912611fafe3cec7f736d2eef3bebff854776452f3de89b3a4f1", 0x4a, 0x91}], 0x0, &(0x7f0000000880)={[], [{@measure='measure'}, {@smackfshat={'smackfshat', 0x3d, 'jfs\x00'}}, {@subj_type={'subj_type', 0x3d, 'jfs\x00'}}, {@appraise='appraise'}, {@uid_eq={'uid', 0x3d, r0}}, {@uid_gt={'uid>', r1}}, {@appraise='appraise'}, {@smackfshat={'smackfshat', 0x3d, '}nodev'}}, {@obj_role={'obj_role', 0x3d, 'jfs\x00'}}, {@smackfsdef={'smackfsdef', 0x3d, 'jfs\x00'}}]}) r2 = creat(&(0x7f0000000940)='./file0\x00', 0x40) setsockopt$bt_BT_VOICE(r2, 0x112, 0xb, &(0x7f0000000980)=0x3, 0x2) 04:23:11 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x300000000000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) [ 2445.682664][T13035] JFS: Cannot determine volume size [ 2445.688093][T13035] JFS: Cannot determine volume size 04:23:11 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x400000, 0x0, 0x0, 0x0) 04:23:11 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2006, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2445.757238][T13035] JFS: charset not found 04:23:11 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x400000000000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:11 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='j.s\x00', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) 04:23:11 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x10000000000000, 0x0) [ 2445.868016][T13035] JFS: Cannot determine volume size [ 2445.909075][T13035] JFS: Cannot determine volume size [ 2445.925496][T13035] JFS: charset not found 04:23:11 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2007, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:11 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1000000, 0x0, 0x0, 0x0) 04:23:11 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x600000000000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:11 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000001700)=ANY=[@ANYBLOB="016573697a652c726573697a652c726573697a653d3078303030303030303030303030303030302c646973636172643d3078303030303030303030303030303230302c696f636861727365743d6d6163726f6d616e2c726573697a653d3078303030303030303030303030303430302c6673636f6a746578743d73797374656d5f752c657569643d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 04:23:11 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x700000000000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:11 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x2000000, 0x0, 0x0, 0x0) 04:23:11 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x40000000000000, 0x0) 04:23:11 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='j/s\x00', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) 04:23:11 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2008, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2446.232927][T13079] jfs: Unrecognized mount option "esize" or missing value 04:23:11 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3000000, 0x0, 0x0, 0x0) 04:23:11 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x800000000000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:11 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x200d, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:12 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x4000000, 0x0, 0x0, 0x0) [ 2446.435478][T13079] jfs: Unrecognized mount option "esize" or missing value 04:23:12 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jf#\x00', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) 04:23:12 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x806000000000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:12 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000001700)={[{@resize='resize'}, {@resize='resize'}, {@resize_size={'resize'}}, {@discard_size={'discard', 0x3d, 0x200}}, {@iocharset={'iocharset', 0x3d, 'macroman'}}, {@resize_size={'resize', 0x3d, 0x400}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@euid_eq={'euid'}}]}) removexattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='trusted.overlay.nlink\x00') 04:23:12 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2010, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:12 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x8000000, 0x0, 0x0, 0x0) 04:23:12 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x100000000000000, 0x0) 04:23:12 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0xd00000000000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:12 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2014, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:12 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jf%\x00', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) 04:23:12 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:12 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3f000000, 0x0, 0x0, 0x0) [ 2446.707127][T13115] JFS: Cannot determine volume size [ 2446.725616][T13115] JFS: Cannot determine volume size [ 2446.740305][T13115] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:23:12 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2028, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:12 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x200000000000000, 0x0) [ 2446.867125][T13115] JFS: Cannot determine volume size [ 2446.883476][T13115] JFS: Cannot determine volume size 04:23:12 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xf6ffffff, 0x0, 0x0, 0x0) [ 2446.909726][T13115] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:23:12 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000001700)={[{@resize='resize'}, {@resize='resize'}, {@resize_size={'resize'}}, {@discard_size={'discard', 0x3d, 0x200}}, {@iocharset={'iocharset', 0x3d, 'macroman'}}, {@resize_size={'resize', 0x3d, 0x400}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@euid_eq={'euid'}}]}) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vcs\x00', 0x0, 0x0) read$eventfd(r0, &(0x7f0000000080), 0x8) 04:23:12 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x4000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:12 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x1100000000000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:12 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jf*\x00', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) 04:23:12 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x1400000000000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:12 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x300000000000000, 0x0) 04:23:12 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0xffff8000, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:12 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xfcfdffff, 0x0, 0x0, 0x0) [ 2447.213169][T13152] JFS: Cannot determine volume size [ 2447.218417][T13152] JFS: Cannot determine volume size 04:23:12 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x1c00000000000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) [ 2447.257242][T13152] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:23:12 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0x2, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:12 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xfdfdffff, 0x0, 0x0, 0x0) 04:23:12 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) [ 2447.482985][T13152] JFS: Cannot determine volume size [ 2447.488223][T13152] JFS: Cannot determine volume size [ 2447.526043][T13152] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:23:13 executing program 0: r0 = openat$full(0xffffffffffffff9c, &(0x7f0000000000)='/dev/full\x00', 0x4000, 0x0) accept4(r0, &(0x7f00000001c0)=@xdp={0x2c, 0x0, 0x0}, &(0x7f0000000240)=0x80, 0x80800) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x32, &(0x7f0000000280)={@rand_addr="af2bf6e735292b94a42e7c0ebd31d50c", r1}, 0x14) ioctl$KVM_GET_SREGS(r0, 0x8138ae83, &(0x7f0000000040)) 04:23:13 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x400000000000000, 0x0) 04:23:13 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0x3, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:13 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jf+\x00', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) 04:23:13 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:13 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xfeffffff, 0x0, 0x0, 0x0) 04:23:13 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xfffffdfc, 0x0, 0x0, 0x0) 04:23:13 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x4305000000000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:13 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0x6, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:13 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000180)="0adc1f023c123f3188a070") pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_ifreq(r2, 0x0, &(0x7f0000000040)={'yam0\x00', @ifru_map={0xa45, 0x6, 0xfffffffffffffff9, 0x0, 0x80000000, 0x5}}) syz_kvm_setup_cpu$x86(r1, 0xffffffffffffffff, &(0x7f0000009000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0, 0x400000001, &(0x7f0000001700)={[{@resize='resize'}, {@resize='resize'}, {@resize_size={'resize'}}, {@discard_size={'discard', 0x3d, 0x200}}, {@integrity='integrity'}, {@resize_size={'resize', 0x3d, 0x400}}]}) 04:23:13 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xfffffdfd, 0x0, 0x0, 0x0) 04:23:13 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x6000000000000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:13 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x500000000000000, 0x0) 04:23:13 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jf-\x00', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) 04:23:13 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0x7, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:13 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x800e000000000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:13 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xfffffff6, 0x0, 0x0, 0x0) 04:23:13 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0x8, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:13 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x600000000000000, 0x0) 04:23:13 executing program 0: r0 = openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/ubi_ctrl\x00', 0x0, 0x0) ioctl$KVM_GET_SUPPORTED_CPUID(r0, 0xc008ae05, &(0x7f00000000c0)=""/4096) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x20000, &(0x7f0000001700)={[], [{@dont_hash='dont_hash'}, {@measure='measure'}]}) 04:23:13 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0xd, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:13 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jf.\x00', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) 04:23:13 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x8035000000000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:13 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xfffffffe, 0x0, 0x0, 0x0) 04:23:13 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0x10, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:13 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x225c17d03, 0x0, 0x0, 0x0) 04:23:13 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x700000000000000, 0x0) 04:23:13 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x8100000000000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:13 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0x14, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:14 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000001700)={[{@resize='resize'}, {@resize='resize'}, {@resize_size={'resize'}}, {@discard_size={'discard', 0x3d, 0x200}}, {@iocharset={'iocharset', 0x3d, 'macroman'}}, {@resize_size={'resize', 0x3d, 0x400}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@euid_eq={'euid'}}]}) r0 = socket$key(0xf, 0x3, 0x2) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000200)='/proc/capi/capi20\x00', 0x2200, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, &(0x7f00000002c0)={'team0\x00', 0x0}) setsockopt$packet_drop_memb(r1, 0x107, 0x2, &(0x7f0000000300)={r2, 0x1, 0x6, @random="479653502f01"}, 0x10) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000080)='/dev/qat_adf_ctl\x00', 0x0, 0x0) r4 = syz_open_dev$usb(&(0x7f0000000100)='/dev/bus/usb/00#/00#\x00', 0xffff, 0x480000) syz_kvm_setup_cpu$x86(r3, r4, &(0x7f0000fe8000/0x18000)=nil, &(0x7f00000001c0)=[@text64={0x40, &(0x7f0000000140)="c4e151dbcb48b8b348acafc44c6d570f23d00f21f835300000090f23f866baf80cb8525d878eef66bafc0cb005eec441fb2c6300660f382095f91d000066ba4300b800600000efdacbc48280f5bd00280000b9800000c00f3235002000000f30260f32", 0x63}], 0x1, 0x8, &(0x7f0000000200), 0x0) ioctl$sock_ifreq(r0, 0x89f7, &(0x7f0000000040)={'bcsf0\x00', @ifru_map={0x4, 0x3, 0x4, 0x222, 0x3, 0x3}}) 04:23:14 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x1000000000000, 0x0, 0x0, 0x0) 04:23:14 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jf0\x00', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) 04:23:14 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:14 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0x28, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:14 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x800000000000000, 0x0) [ 2448.565159][T13262] JFS: Cannot determine volume size [ 2448.579374][T13262] JFS: Cannot determine volume size [ 2448.590678][T13262] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:23:14 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x8847000000000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:14 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x40000000000000, 0x0, 0x0, 0x0) [ 2448.614911][T13269] QAT: Invalid ioctl [ 2448.633855][T13269] QAT: Invalid ioctl 04:23:14 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jfX\x00', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) 04:23:14 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0xf0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2448.659217][T13269] QAT: Invalid ioctl [ 2448.667793][T13269] QAT: Invalid ioctl [ 2448.709361][T13269] QAT: Invalid ioctl [ 2448.721057][T13269] QAT: Invalid ioctl [ 2448.725132][T13269] QAT: Invalid ioctl [ 2448.739453][T13269] QAT: Invalid ioctl 04:23:14 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x8848000000000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) [ 2448.756605][T13269] QAT: Invalid ioctl [ 2448.776879][T13269] QAT: Invalid ioctl 04:23:14 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x100000000000000, 0x0, 0x0, 0x0) [ 2448.804917][T13269] QAT: Invalid ioctl [ 2448.826834][T13269] QAT: Invalid ioctl [ 2448.864050][T13269] QAT: Invalid ioctl [ 2448.909490][T13269] QAT: Invalid ioctl [ 2448.913627][T13269] QAT: Invalid ioctl [ 2448.917519][T13269] QAT: Invalid ioctl [ 2448.955745][T13269] QAT: Invalid ioctl [ 2448.963027][T13269] QAT: Invalid ioctl [ 2448.967085][T13269] QAT: Invalid ioctl [ 2448.974819][T13269] QAT: Invalid ioctl [ 2448.982046][T13269] QAT: Invalid ioctl [ 2448.986090][T13269] QAT: Invalid ioctl [ 2448.994644][T13269] QAT: Invalid ioctl [ 2449.009065][T13269] QAT: Invalid ioctl [ 2449.015269][T13269] QAT: Invalid ioctl [ 2449.028026][T13262] JFS: Cannot determine volume size [ 2449.036414][T13262] JFS: Cannot determine volume size [ 2449.044851][T13262] jfs: Unrecognized mount option "fscontext=system_u" or missing value [ 2449.074894][T13269] QAT: Invalid ioctl [ 2449.082084][T13269] QAT: Invalid ioctl [ 2449.086058][T13269] QAT: Invalid ioctl [ 2449.102683][T13269] QAT: Invalid ioctl [ 2449.106667][T13269] QAT: Invalid ioctl [ 2449.116281][T13269] QAT: Invalid ioctl [ 2449.123720][T13269] QAT: Invalid ioctl [ 2449.127692][T13269] QAT: Invalid ioctl [ 2449.142344][T13269] QAT: Invalid ioctl [ 2449.149208][T13269] QAT: Invalid ioctl [ 2449.153118][T13269] QAT: Invalid ioctl [ 2449.157008][T13269] QAT: Invalid ioctl [ 2449.161246][T13269] QAT: Invalid ioctl [ 2449.165192][T13269] QAT: Invalid ioctl [ 2449.169370][T13269] QAT: Invalid ioctl 04:23:14 executing program 0: r0 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) ioctl$TCSETSW(r0, 0x5403, &(0x7f00000002c0)={0x20, 0x8, 0x100000000, 0xcad3, 0xe, 0xe91, 0x8, 0x5a910000, 0xffffffffffffffff, 0x0, 0x8000000000000, 0xffff}) r1 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm_plock\x00', 0x902, 0x0) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000140)={0x7, 0x0, [{0x1, 0x3, 0x0, 0x0, @irqchip={0x7, 0x3}}, {0xfffffffffffffffb, 0x3, 0x0, 0x0, @adapter={0x36, 0xa9a, 0x3f, 0x9c, 0x9a05}}, {0x9, 0x2, 0x0, 0x0, @adapter={0x40, 0x10001, 0x8000, 0x5, 0x8}}, {0x1, 0x1, 0x0, 0x0, @msi={0x5, 0x1, 0x3}}, {0x0, 0x5, 0x0, 0x0, @sint={0x6, 0x400}}, {0x8, 0x2, 0x0, 0x0, @sint={0xfffffffffffffffb, 0x80000000}}, {0x1000, 0x3, 0x0, 0x0, @msi={0x3b6, 0xd6b, 0xcd2c}}]}) bind$rxrpc(r1, &(0x7f0000000080)=@in4={0x21, 0x4, 0x2, 0x10, {0x2, 0x4e22, @empty}}, 0x24) openat$vfio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vfio/vfio\x00', 0x400100, 0x0) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000001700)={[{@resize='resize'}, {@resize='resize'}, {@resize_size={'resize'}}, {@discard_size={'discard', 0x3d, 0x200}}, {@iocharset={'iocharset', 0x3d, 'macroman'}}, {@resize_size={'resize', 0x3d, 0x400}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@euid_eq={'euid'}}]}) 04:23:14 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0x300, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:14 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x8864000000000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:14 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x900000000000000, 0x0) 04:23:14 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x200000000000000, 0x0, 0x0, 0x0) 04:23:14 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jfc\x00', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) [ 2449.173259][T13269] QAT: Invalid ioctl [ 2449.177148][T13269] QAT: Invalid ioctl [ 2449.181352][T13269] QAT: Invalid ioctl [ 2449.185260][T13269] QAT: Invalid ioctl [ 2449.189406][T13269] QAT: Invalid ioctl [ 2449.193344][T13269] QAT: Invalid ioctl [ 2449.197234][T13269] QAT: Invalid ioctl [ 2449.201412][T13269] QAT: Invalid ioctl 04:23:14 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0x543, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:14 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x300000000000000, 0x0, 0x0, 0x0) 04:23:14 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x88a8ffff00000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) [ 2449.393282][T13311] JFS: Cannot determine volume size 04:23:14 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0x600, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:14 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xa00000000000000, 0x0) [ 2449.420247][T13311] JFS: Cannot determine volume size [ 2449.429002][T13311] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:23:15 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x37dc12502000000, 0x0, 0x0, 0x0) [ 2449.518142][T13324] JFS: Cannot determine volume size [ 2449.541883][T13324] JFS: Cannot determine volume size [ 2449.566876][T13324] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:23:15 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000100)=ANY=[@ANYBLOB='resize,resize,resize=0x0000000000000000,discard=0x0000000000000200,iocharset=macroman,resize=0x0000000000000400,fscontext=system_u,euid=', @ANYPTR64=&(0x7f00000002c0)=ANY=[@ANYRESDEC, @ANYRES64, @ANYRES32, @ANYPTR=&(0x7f0000000040)=ANY=[@ANYRES64], @ANYRES64, @ANYPTR=&(0x7f00000001c0)=ANY=[@ANYBLOB="ccbf555ed7dab7739eaa07e7741f71d88c45ce384aa912bc611e0c65dfd33e70de627fbd17fd68335aea2e67809d5c7800f943015e109a802beeaebf48c99951cc15eb05230337cef19f264699c8cd2519df73581c5b52be3f4955742a71efac9b90ce898a9f5e192332cebd8a03adab9e24a95d454e0cb505ac1a3042e7ac0c30186fa734029a0ccddff2571fd4a735c406e0f2263ad12747650af76d397cc78579424dc37774e57f12bc78abef48", @ANYRESOCT, @ANYRESDEC], @ANYRESDEC, @ANYBLOB="91018dcb898dcef761f0a89ab4f7", @ANYRESHEX], @ANYBLOB="2cd5aef97dba39023c04"]) r0 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x8, 0x210000) ioctl$TIOCMBIC(r0, 0x5417, &(0x7f0000000340)=0x1) 04:23:15 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jfd\x00', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) 04:23:15 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0x608, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:15 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x88caffff00000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:15 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x400000000000000, 0x0, 0x0, 0x0) 04:23:15 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x800000000000000, 0x0, 0x0, 0x0) 04:23:15 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x8906000000000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:15 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x190f000000000000, 0x0) 04:23:15 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0x689, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2449.845755][T13349] JFS: Cannot determine volume size 04:23:15 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0xfeffffff00000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:15 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x3f00000000000000, 0x0, 0x0, 0x0) 04:23:15 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0x700, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2449.908227][T13349] JFS: Cannot determine volume size [ 2449.914262][T13349] jfs: Unrecognized mount option "fscontext=system_u" or missing value [ 2450.006093][T13349] JFS: Cannot determine volume size [ 2450.012631][T13349] JFS: Cannot determine volume size [ 2450.028585][T13349] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:23:15 executing program 0: r0 = openat$dlm_plock(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dlm_plock\x00', 0x1, 0x0) bind$llc(r0, &(0x7f0000000180)={0x1a, 0x336, 0x7, 0x4, 0x3, 0x3, @link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0xf}}, 0x10) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000200)={[{@resize='resize'}, {@resize='resize'}, {@iocharset={'iocharset', 0x3d, 'cp864'}}, {@discard_size={'discard', 0x3d, 0x200}}, {@resize_size={'resize', 0x3d, 0xfffffffffffffff7}}, {@resize_size={'resize', 0x3d, 0x400}}], [{@measure='measure'}, {@euid_eq={'euid'}}]}) r1 = socket$nl_generic(0x10, 0x3, 0x10) getsockopt$IP_VS_SO_GET_SERVICES(r1, 0x0, 0x482, &(0x7f0000000040)=""/82, &(0x7f0000000100)=0x52) 04:23:15 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1f00000000000000, 0x0) 04:23:15 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xf6ffffff00000000, 0x0, 0x0, 0x0) 04:23:15 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jfi\x00', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) 04:23:15 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffff000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:15 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0x806, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:15 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:15 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xfcfdffff00000000, 0x0, 0x0, 0x0) 04:23:15 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0xd00, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:15 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000000000000, 0x0) 04:23:15 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) [ 2450.359723][T13381] JFS: Cannot determine volume size 04:23:15 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jfl\x00', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) [ 2450.400577][T13381] JFS: Cannot determine volume size [ 2450.589237][T13385] JFS: Cannot determine volume size [ 2450.594480][T13385] JFS: Cannot determine volume size 04:23:16 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000100)={[{@nointegrity='nointegrity'}, {@resize='resize'}, {@resize='resize'}, {@discard_size={'discard', 0x3d, 0x200}}, {@iocharset={'iocharset', 0x3d, 'macroman'}}, {@resize_size={'resize', 0x3d, 0x400}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@euid_eq={'euid'}}]}) setxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='trusted.syz\x00', &(0x7f00000001c0)='system_u', 0x8, 0x2) 04:23:16 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xfdfdffff00000000, 0x0, 0x0, 0x0) 04:23:16 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0xe80, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:16 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:16 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2010000000000000, 0x0) 04:23:16 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xfeffffff00000000, 0x0, 0x0, 0x0) 04:23:16 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:16 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jfo\x00', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) 04:23:16 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0x1400, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:16 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0x2000, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2450.923403][T13414] JFS: Cannot determine volume size [ 2450.923415][T13414] JFS: Cannot determine volume size 04:23:16 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2300000000000000, 0x0) 04:23:16 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffff00000000, 0x0, 0x0, 0x0) [ 2450.974529][T13414] jfs: Unrecognized mount option "fscontext=system_u" or missing value [ 2451.099635][T13414] JFS: Cannot determine volume size [ 2451.104977][T13414] JFS: Cannot determine volume size [ 2451.105004][T13414] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:23:16 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000100)=ANY=[@ANYBLOB="726573697a652c726573697a652c726573697a653d3078303030303030303030303092bb3030302c646973636172643d3078303030df000000303030303d6d6163726f6d616e2c7230303030303030303030303430302c6673636f6e746578743d96e7583f758eb1833073797374656d5f752c657569643d4d8e50712e71fe0795ab5a09bcf4df38849b3b331fade1e90cbf41d977f57d2a543f83b598c02cc703de4ed012e6a77f60ba8cbd244d4c05b5", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 04:23:16 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:16 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0x2800, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:16 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jfp\x00', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) 04:23:16 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) 04:23:16 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x3f00000000000000, 0x0) 04:23:16 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:16 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2, 0x0) 04:23:16 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0x3580, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:17 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:17 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x4000000000000000, 0x0) 04:23:17 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jfu\x00', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) [ 2451.506519][T13451] JFS: Cannot determine volume size [ 2451.519040][T13451] JFS: Cannot determine volume size [ 2451.524350][T13451] jfs: Unrecognized mount option "resize=0x00000000000’»000" or missing value 04:23:17 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x3, 0x0) 04:23:17 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0x3f00, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:17 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000001700)={[{@resize='resize'}, {@resize='resize'}, {@resize_size={'resize'}}, {@discard_size={'discard', 0x3d, 0x200}}, {@iocharset={'iocharset', 0x3d, 'macroman'}}, {@resize_size={'resize', 0x3d, 0x400}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@euid_eq={'euid'}}]}) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0x0, 0x0) setsockopt$inet6_int(r0, 0x29, 0x49, &(0x7f0000000080)=0x1, 0x4) 04:23:17 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:17 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x4800000000000000, 0x0) 04:23:17 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0x4000, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:17 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:17 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x4, 0x0) 04:23:17 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jfx\x00', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) [ 2451.856893][T13478] JFS: Cannot determine volume size 04:23:17 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0x4305, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2451.913833][T13478] JFS: Cannot determine volume size [ 2451.939471][T13478] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:23:17 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:17 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x8, 0x0) 04:23:17 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0x4788, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:17 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x4c00000000000000, 0x0) 04:23:17 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000001700)={[{@resize='resize'}, {@resize='resize'}, {@resize_size={'resize'}}, {@discard_size={'discard', 0x3d, 0x200}}, {@iocharset={'iocharset', 0x3d, 'macroman'}}, {@resize_size={'resize', 0x3d, 0x400}}], [{@subj_user={'subj_user', 0x3d, 'macroman'}}, {@euid_eq={'euid'}}]}) 04:23:17 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:17 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0x4888, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:17 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x300, 0x0) 04:23:17 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jfs\x02', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) 04:23:17 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1c}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:17 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0x6488, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:17 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x6800000000000000, 0x0) 04:23:17 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x3f00, 0x0) [ 2452.423854][T13518] JFS: Cannot determine volume size 04:23:18 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:18 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0x800e, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2452.469541][T13518] JFS: Cannot determine volume size [ 2452.474860][T13518] jfs: Unrecognized mount option "subj_user=macroman" or missing value [ 2452.547826][T13518] JFS: Cannot determine volume size [ 2452.559315][T13518] JFS: Cannot determine volume size [ 2452.564570][T13518] jfs: Unrecognized mount option "subj_user=macroman" or missing value 04:23:18 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jfs\x03', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) 04:23:18 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:18 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000080)={0x0, 0x0, 0x0}, &(0x7f00000002c0)=0xc) setfsgid(r0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000100)={{{@in6=@initdev, @in=@broadcast, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@remote}}, &(0x7f0000000040)=0xe8) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x4000000000000, 0x0, 0x0, 0x1, &(0x7f0000000200)={[{@resize='resize'}, {@uid={'uid', 0x3d, r1}}, {@resize_size={'resize'}}, {@discard_size={'discard', 0x3d, 0x200}}, {@iocharset={'iocharset', 0x3d, 'macroman'}}, {@resize_size={'resize', 0x3d, 0x400}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@euid_eq={'euid'}}]}) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg(r2, &(0x7f0000000700)={&(0x7f0000000300)=@rxrpc=@in6={0x21, 0x3, 0x2, 0x1c, {0xa, 0x4e23, 0x1, @initdev={0xfe, 0x88, [], 0x1, 0x0}}}, 0x80, &(0x7f00000004c0)=[{&(0x7f0000000380)="8056e7046ae8aabeec4b9ca05e2a9aabd35e6278c57f75d0918d182225d8101be205ca23276e8cd8a6e559f25cb41d3b4f94278b4312da7ad42f880b4257f92d66522586915040e03ade24d0b9cc72f1e69cb22def4b51948b184b9bab1412d7f2d9cdb932e1d3222f44ba3e32eb058b5b1588c1be08168b03", 0x79}, {&(0x7f0000000400)="0b27e0a577ca9e4411dfc850b99e5d1ab9f07e9408c11bbaf60b3a92cc18a23427e59547f737b90268a06ef9d36e97e7f73b753f62dba8d400502ce2d7f66ac9cdcdee2a565056321332edd5510903b00f9b5e6c83be0f02337948904a5170063d7683c57b8065a8395f52eb26614ffda9156ac8b1f90bea5235250e849430c6dbf35c0779b9c850b3a5777437bb34d36b4785155c", 0x95}], 0x2, &(0x7f0000000500)=[{0x60, 0x109, 0x5, "f11f86d0509734980046d35ded388c62f84d8acff3dc3c5f75e9fddf54cc1115229194818534b58e4878eae7be508e13c2934eb65a228d06618ecd3410a3fd9e4fb4ca305b2b63b01fb699"}, {0x18, 0x10f, 0xcbed, "c0324451b0b2c2"}, {0x20, 0x107, 0xdf, "888a0baac2f015e4d485b04f3980"}, {0x88, 0x102, 0x7fff, "1233155a3daba4fabe941b8183f8f87cef7698748e25c5bc46d923bb6609553e04ac25ca6c7997c84e7db9c3f62830eac01c810d8b97f58f2d5d32f3a1d81b92b946532b942a916940d7ef682b8343e14c488d187e126ae6e93ea3527692478bff5e8a33cc140f0c9c8223ae08a8ba2c82cfbb"}, {0xc8, 0x115, 0x200, "a80192737083bcfc90296ea08bc34269d1cca7877856e514195f6854d82f10923dcfadc46afce271d3c5d6f13a174aedcadeb83d76ec370c63d545ce0c1c3c14a49e5e8c76b0207b19d0b0012739fa882993d4f1e326f048262c0796d6a40265c550ddd5ec9398d92aaaa30f77dd18bca450d23f935280e2b81216ec19e9424a27ab36e08ac0253954567364e9cf854e10c46005a58f403012092fc79596d0ea55bc30ca566248f400011755a76c95b1548c"}], 0x1e8}, 0x20008844) 04:23:18 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0x8035, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:18 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:18 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x4000, 0x0) 04:23:18 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x6c00000000000000, 0x0) 04:23:18 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0x8100, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2452.851427][T13546] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:23:18 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x543}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:18 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000001700)=ANY=[@ANYBLOB="726573697a652c726573697a652c726573697a653d3078303030303030303030303030303030302c646973636172643d30783030303030303030303030303067d8a17c696f636861727365743d6d6163726f6d616e2c726573697a653d3078303030303030303030303030303430302c6673636f6e746578743d73797374656d5f752c657569643d", @ANYRESDEC=0x0, @ANYBLOB='\x00\x00']) r0 = syz_open_dev$vcsa(&(0x7f0000000040)='/dev/vcsa#\x00', 0x0, 0x80000) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000080)={@multicast1, @loopback, @broadcast}, 0xc) 04:23:18 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0x8847, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:18 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jfs\x04', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) 04:23:18 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) [ 2453.051686][T13562] JFS: Cannot determine volume size 04:23:18 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x400000, 0x0) 04:23:18 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0x8848, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2453.088582][T13562] JFS: Cannot determine volume size 04:23:18 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x7400000000000000, 0x0) [ 2453.121335][T13562] jfs: Unrecognized mount option "discard=0x0000000000000gØ¡|iocharset=macroman" or missing value 04:23:18 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000, 0x0) 04:23:18 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x608}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:18 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0x8864, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2453.280286][T13562] JFS: Cannot determine volume size [ 2453.285525][T13562] JFS: Cannot determine volume size [ 2453.285545][T13562] jfs: Unrecognized mount option "discard=0x0000000000000gØ¡|iocharset=macroman" or missing value 04:23:18 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jfs\x05', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) 04:23:18 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000001700)={[{@resize='resize'}, {@resize='resize'}, {@resize_size={'resize'}}, {@discard_size={'discard', 0x3d, 0x200}}, {@iocharset={'iocharset', 0x3d, 'macroman'}}, {@resize_size={'resize', 0x3d, 0x400}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@euid_eq={'euid'}}]}) syz_genetlink_get_family_id$tipc(&(0x7f0000000040)='TIPC\x00') 04:23:18 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0x8906, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:18 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x689}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:18 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x7a00000000000000, 0x0) 04:23:19 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x2000000, 0x0) 04:23:19 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:19 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0xf000, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:19 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x3000000, 0x0) [ 2453.621743][T13603] JFS: Cannot determine volume size 04:23:19 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jfs\x06', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) [ 2453.642069][T13603] JFS: Cannot determine volume size [ 2453.694357][T13603] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:23:19 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0xf0ffff, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:19 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x7fffffffffffffff, 0x0) 04:23:19 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x4000000, 0x0) [ 2453.820325][T13603] JFS: Cannot determine volume size [ 2453.825568][T13603] JFS: Cannot determine volume size [ 2453.860041][T13603] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:23:19 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000001700)={[{@resize='resize'}, {@resize='resize'}, {@resize_size={'resize'}}, {@discard_size={'discard', 0x3d, 0x200}}, {@iocharset={'iocharset', 0x3d, 'macroman'}}, {@resize_size={'resize', 0x3d, 0x400}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@euid_eq={'euid'}}]}) syz_mount_image$btrfs(&(0x7f0000000040)='btrfs\x00', &(0x7f0000000080)='./file0\x00', 0x7f, 0x5, &(0x7f0000001300)=[{&(0x7f0000000100)="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", 0x1000, 0x6}, {&(0x7f0000001100)="3bfbaed1aaa3fee2bd3637ac55def23e6273731d4412cd8284f260f287617f71a3813bb5c29c61207c478b733e2a63c31937a064b879f0685a7b84bcadb2f61342207ab191ae04265beee4e4de0764fe0c81c99702ce9a", 0x57, 0x6}, {&(0x7f0000001180)="5557376aa774f50591d69816ae7792874c0479f3d1c04400f4a329e5af1e36f3b27c5bf542766eb241f56208f43d3841285b10ccdf7070", 0x37, 0xf76}, {&(0x7f00000011c0)="9864df9a81610a5b1529b6a2a722f823be88dcdc", 0x14, 0x8}, {&(0x7f0000001200)="146dfaece5502ecfca5c85648b70c2f3d150ce409b5b8ede1ae0e7946fec1a4bf525ca8a2839cc499151138f346577dc4bef86bf66f72d763aa67a4c433185c037634b47f518f4cce0b27c696001acfb7077873dd6fa3cb5c144d7047a5c50f87c2566494710308f27147efc814da5872ffcb1013a6de2cc6ecae007d708fb34ce6046cdbcd4a20613c8832caa7cd81b9e4e439c20a0966d6ec69018222ab23e2ee6f0e7f4121679a5139c4865ac2b60fb29d6b574fa9204082202fe3fa4f3cacf9efee4efd44f95326774deeca4a5424e9d2f5203f168c95a2c2af471b6f0b90fe8205eed21a96da7d571e4e6d716", 0xef, 0x1}], 0x30080, &(0x7f0000001380)={[{@treelog='treelog'}], [{@subj_user={'subj_user'}}, {@smackfstransmute={'smackfstransmute', 0x3d, 'discard'}}, {@dont_hash='dont_hash'}]}) 04:23:19 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x806}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:19 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0x1000000, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:19 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x8000000, 0x0) 04:23:19 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:19 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x8000000000000000, 0x0) 04:23:19 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jfs\a', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) 04:23:19 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0x2000000, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:19 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe80}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:19 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x3f000000, 0x0) [ 2454.182432][T13640] JFS: Cannot determine volume size [ 2454.192331][T13640] JFS: Cannot determine volume size [ 2454.213868][T13640] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:23:19 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0x3000000, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:19 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) [ 2454.382956][T13640] JFS: Cannot determine volume size [ 2454.388190][T13640] JFS: Cannot determine volume size [ 2454.455824][T13640] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:23:20 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000100)={[{@discard='discard'}, {@resize='resize'}, {@errors_continue='errors=continue'}, {@quota='quota'}, {@iocharset={'iocharset', 0x3d, 'macroman'}}, {@noquota='noquota'}]}) 04:23:20 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0x6000000, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:20 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x8cffffff00000000, 0x0) 04:23:20 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jfs\b', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) 04:23:20 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1400}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:20 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xf6ffffff, 0x0) 04:23:20 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1c00}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:20 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0x7000000, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2454.740379][T13675] JFS: Cannot determine volume size 04:23:20 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jfs\t', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) 04:23:20 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0x8000000, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:20 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:20 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xf4ffffff00000000, 0x0) [ 2454.875192][T13675] JFS: Cannot determine volume size 04:23:20 executing program 0: r0 = syz_open_dev$radio(&(0x7f0000000240)='/dev/radio#\x00', 0x3, 0x2) write$P9_RREADDIR(r0, &(0x7f0000000140)={0x4f, 0x29, 0x1, {0x4c80, [{{0x80, 0x3, 0x7}, 0xda0, 0x3, 0x7, './file1'}, {{0x61, 0x1, 0x1}, 0x5, 0x8, 0xd, './file0/file0'}]}}, 0x4f) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000001700)={[{@resize='resize'}, {@resize='resize'}, {@resize_size={'resize'}}, {@discard_size={'discard', 0x3d, 0x200}}, {@iocharset={'iocharset', 0x3d, 'macroman'}}, {@resize_size={'resize', 0x3d, 0x400}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@euid_eq={'euid'}}]}) ioctl$sock_kcm_SIOCKCMCLONE(0xffffffffffffff9c, 0x89e2, &(0x7f0000000040)={0xffffffffffffffff}) setsockopt$inet_buf(r1, 0x0, 0x2e, &(0x7f0000000080)="9b69c26b617dae9a1fcfc553d914ed44ee0dc807e413bbd720ac4fc3de51f5d4140afdd6eb4d", 0x26) 04:23:20 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xfcfdffff, 0x0) 04:23:20 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3580}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:20 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0x8060000, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:20 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0xd000000, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:20 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:20 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xf5ffffff00000000, 0x0) 04:23:20 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xfdfdffff, 0x0) 04:23:20 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jfs\n', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) 04:23:20 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0x10000000, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:20 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) [ 2455.231935][T13704] JFS: Cannot determine volume size [ 2455.248042][T13704] JFS: Cannot determine volume size [ 2455.267972][T13704] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:23:20 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xfeffffff, 0x0) 04:23:21 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4788}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:21 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0x14000000, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:21 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xfffffdfc, 0x0) 04:23:21 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000001700)=ANY=[@ANYBLOB='resize,resize,resize=0x0000000000000000,discard=0x0000000000000200,iocharset=macroman,resize=0x0000000000000400,fscontext=system_u,euid=', @ANYRESDEC=0x0, @ANYBLOB="0004"]) r0 = syz_open_dev$admmidi(&(0x7f0000000040)='/dev/admmidi#\x00', 0x20, 0x400) ioctl$KVM_TPR_ACCESS_REPORTING(r0, 0xc028ae92, &(0x7f0000000080)={0x4, 0x6}) 04:23:21 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xf6ffffff00000000, 0x0) 04:23:21 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4888}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:21 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0x20000000, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:21 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xfffffdfd, 0x0) [ 2455.633636][T13737] JFS: Cannot determine volume size 04:23:21 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jfs\x10', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) [ 2455.663954][T13737] JFS: Cannot determine volume size [ 2455.679525][T13737] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:23:21 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xfffffff6, 0x0) 04:23:21 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:21 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0x28000000, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:21 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xf9fdffff00000000, 0x0) [ 2455.831939][T13737] JFS: Cannot determine volume size [ 2455.846318][T13737] JFS: Cannot determine volume size 04:23:21 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0x3f000000, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:21 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jfs#', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) [ 2455.874327][T13737] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:23:21 executing program 0: r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000040)='/dev/snapshot\x00', 0xa002, 0x0) setsockopt$inet_sctp_SCTP_RECVNXTINFO(r0, 0x84, 0x21, &(0x7f0000000080)=0x4, 0x4) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000001700)={[{@resize='resize'}, {@resize='resize'}, {@resize_size={'resize'}}, {@discard_size={'discard', 0x3d, 0x200}}, {@iocharset={'iocharset', 0x3d, 'macroman'}}, {@resize_size={'resize', 0x3d, 0x400}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@euid_eq={'euid'}}]}) 04:23:21 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6488}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:21 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xfffffffe, 0x0) 04:23:21 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0x40000000, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:21 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xfbffffff00000000, 0x0) 04:23:21 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0x43050000, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:21 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800e}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:21 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x225c17d03, 0x0) 04:23:21 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0x800e0000, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:21 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8035}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:21 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xfcfdffff00000000, 0x0) 04:23:21 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000000000, 0x0) [ 2456.292811][T13781] JFS: Cannot determine volume size [ 2456.311749][T13781] JFS: Cannot determine volume size [ 2456.331769][T13781] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:23:22 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x28b, 0x0, 0x1, &(0x7f0000001700)={[{@resize='resize'}, {@resize='resize'}, {@resize_size={'resize'}}, {@discard_size={'discard', 0x3d, 0x200}}, {@iocharset={'iocharset', 0x3d, 'macroman'}}, {@resize_size={'resize', 0x3d, 0x400}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@euid_eq={'euid'}}]}) 04:23:22 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jfsH', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) 04:23:22 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0x80350000, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:22 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:22 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xfdfdffff00000000, 0x0) 04:23:22 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x40000000000000, 0x0) 04:23:22 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0x81000000, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:22 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8847}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:22 executing program 0: r0 = fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_REVISION_MATCH(r0, 0x29, 0x44, &(0x7f0000000040)={'NETMAP\x00'}, &(0x7f0000000080)=0x1e) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0xffffffffffffffff, 0x0, 0x0, 0x1, &(0x7f0000000100)=ANY=[]) 04:23:22 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0x86ddffff, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:22 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x100000000000000, 0x0) 04:23:22 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8848}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:22 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xfeffffff00000000, 0x0) 04:23:22 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jfsL', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) 04:23:22 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0x88470000, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:22 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8864}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:22 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0x88480000, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:22 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8906}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:22 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x200000000000000, 0x0) 04:23:22 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xff0f000000000000, 0x0) 04:23:22 executing program 0: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000000040)='/dev/cachefiles\x00', 0x0, 0x0) syz_mount_image$ext4(&(0x7f00000001c0)='ext2\x00', &(0x7f0000000200)='./file0\x00', 0x4, 0x1, &(0x7f0000000300)=[{&(0x7f0000000240)="2c887cd1d801591183c7af349db4e42b91d9e0eb21537b029ecabb88fe413180e890550cbed62b4a2a25c638fb2f0038925302a74bdb0b523135daa62bf9f0e95aa52879273e7afb5f614166ff2df9fa3a3afbcf5c458041dd3809d71483135cd0ba00cc04dedfd8bfcc1bb2326d14a5ffb7741b25b34f95151d17543a5d15e5e58efef39e1f2da1be77514c0a7d6fef5392263858927c2c62158eaa4f27c5ea8d", 0xa1, 0x57cc914e}], 0x1000040, &(0x7f0000000340)={[{@data_writeback='data=writeback'}, {@noinit_itable='noinit_itable'}, {@auto_da_alloc='auto_da_alloc'}, {@errors_remount='errors=remount-ro'}, {@test_dummy_encryption='test_dummy_encryption'}, {@data_err_abort='data_err=abort'}, {@nobh='nobh'}, {@errors_continue='errors=continue'}], [{@audit='audit'}, {@audit='audit'}, {@subj_type={'subj_type', 0x3d, 'iocharset'}}, {@context={'context', 0x3d, 'sysadm_u'}}, {@appraise_type='appraise_type=imasig'}]}) ioctl$TIOCGPGRP(0xffffffffffffff9c, 0x540f, &(0x7f0000000080)=0x0) getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000100)={0x0, 0x0}, &(0x7f0000000140)=0xc) ioctl$DRM_IOCTL_GET_CLIENT(r0, 0xc0286405, &(0x7f0000000180)={0x7ff, 0x0, r1, 0x0, r2, 0x0, 0x2902, 0x80}) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000001700)={[{@resize='resize'}, {@resize='resize'}, {@resize_size={'resize'}}, {@discard_size={'discard', 0x3d, 0x200}}, {@iocharset={'iocharset', 0x3d, 'macroman'}}, {@resize_size={'resize', 0x3d, 0x400}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@euid_eq={'euid'}}]}) 04:23:22 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0x88640000, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:22 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:22 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jfsh', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) 04:23:22 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0x88a8ffff, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:22 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x300000000000000, 0x0) 04:23:22 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xffffff7f00000000, 0x0) [ 2457.331881][T13859] EXT4-fs (loop0): VFS: Can't find ext4 filesystem 04:23:22 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffff}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:22 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0x88caffff, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:22 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x2b5, 0x0, 0x1, &(0x7f0000000100)={[{@resize='resize'}, {@resize='resize'}, {@resize_size={'resize'}}, {@discard_size={'discard', 0x3d, 0x200}}, {@iocharset={'iocharset', 0x3d, 'macroman'}}, {@resize_size={'resize', 0x3d, 0x400}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@permit_directio='permit_directio'}]}) 04:23:23 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x37dc12502000000, 0x0) 04:23:23 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jfsl', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) 04:23:23 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:23 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xfffffec7, 0x0, 0x1, &(0x7f0000000100)={[{@resize='resize'}, {@resize='resize'}, {@resize_size={'resize'}}, {@discard_size={'discard', 0x3d, 0x200}}, {@iocharset={'iocharset', 0x3d, 'macroman'}}, {@resize_size={'resize', 0x3d, 0x400}}]}) 04:23:23 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0x89060000, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:23 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xffffffff00000000, 0x0) 04:23:23 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x400000000000000, 0x0) 04:23:23 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000001700)={[{@resize='resize'}, {@resize='resize'}, {@resize_size={'resize'}}, {@discard_size={'discard', 0x3d, 0x200}}, {@iocharset={'iocharset', 0x3d, 'macroman'}}, {@resize_size={'resize', 0x3d, 0x400}}]}) r0 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x0, 0x2) ioctl$EVIOCGABS3F(r0, 0x8018457f, &(0x7f0000000100)=""/83) 04:23:23 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0xffffa888, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:23 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:23 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jfst', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) 04:23:23 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0xffffca88, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:23 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xffffffffffff0700, 0x0) 04:23:23 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:23 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x800000000000000, 0x0) [ 2457.920961][T13906] JFS: Cannot determine volume size [ 2457.926325][T13906] JFS: Cannot determine volume size [ 2457.926356][T13906] resize option for remount only 04:23:23 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0xffffdd86, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2458.115475][T13906] JFS: Cannot determine volume size [ 2458.138142][T13906] JFS: Cannot determine volume size 04:23:23 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0xfffff000, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:23 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) [ 2458.160334][T13906] resize option for remount only 04:23:23 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x3f00000000000000, 0x0) 04:23:23 executing program 0: r0 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x6, 0x4000) getsockname$unix(r0, &(0x7f0000000100), &(0x7f0000000080)=0x6e) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000001700)={[{@resize='resize'}, {@resize='resize'}, {@resize_size={'resize'}}, {@discard_size={'discard', 0x3d, 0x200}}, {@iocharset={'iocharset', 0x3d, 'macroman'}}, {@resize_size={'resize', 0x3d, 0x400}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@euid_eq={'euid'}}]}) 04:23:23 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xffffffffffffff7f, 0x0) 04:23:23 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0xf0ffffffffffff, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:23 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jfsz', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) 04:23:23 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:23 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xf6ffffff00000000, 0x0) 04:23:23 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0x100000000000000, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:23 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:24 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0x200000000000000, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:24 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) 04:23:24 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) [ 2458.560735][T13950] JFS: Cannot determine volume size [ 2458.567892][T13950] JFS: Cannot determine volume size [ 2458.587147][T13950] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:23:24 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) [ 2458.683478][T13963] JFS: Cannot determine volume size [ 2458.688711][T13963] JFS: Cannot determine volume size [ 2458.694061][T13963] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:23:24 executing program 0: lookup_dcookie(0x1, &(0x7f0000000040)=""/54, 0x36) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000001700)={[{@resize='resize'}, {@resize='resize'}, {@resize_size={'resize'}}, {@discard_size={'discard', 0x3d, 0x200}}, {@iocharset={'iocharset', 0x3d, 'macroman'}}, {@resize_size={'resize', 0x3d, 0x400}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@euid_eq={'euid'}}]}) 04:23:24 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xfcfdffff00000000, 0x0) 04:23:24 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0x300000000000000, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:24 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8060000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:24 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0x600000000000000, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:24 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:24 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f000001bfc8)={&(0x7f0000db4000), 0xc, &(0x7f00006bcff0)={&(0x7f000013e000)=@ipv6_newroute={0x2c, 0x18, 0x301, 0x0, 0x0, {}, [@RTA_ENCAP_TYPE={0x8, 0x15, 0x2}, @RTA_ENCAP={0x8, 0x16, @nested={0x4, 0x2}}]}, 0x2c}}, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r0, 0x40286608, &(0x7f0000000040)={0x0, 0x400, 0xbd, 0x3f, 0x9cf, 0xff}) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 04:23:24 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xfdfdffff00000000, 0x0) 04:23:24 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) [ 2459.022563][T13984] JFS: Cannot determine volume size 04:23:24 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:24 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0x700000000000000, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2459.049109][T13984] JFS: Cannot determine volume size [ 2459.054371][T13984] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:23:24 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xfeffffff00000000, 0x0) [ 2459.103455][T13988] netlink: 'syz-executor2': attribute type 21 has an invalid length. [ 2459.141269][T13988] netlink: 'syz-executor2': attribute type 2 has an invalid length. 04:23:24 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000001700)={[{@resize='resize'}, {@resize='resize'}, {@resize_size={'resize'}}, {@discard_size={'discard', 0x3d, 0x200}}, {@iocharset={'iocharset', 0x3d, 'macroman'}}, {@resize_size={'resize', 0x3d, 0x400}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@euid_eq={'euid'}}]}) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffff9c, 0x0, 0x10, &(0x7f0000000600)={{{@in6=@ipv4={[], [], @remote}, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@empty}, 0x0, @in6=@mcast1}}, &(0x7f0000000700)=0xe8) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffff9c, 0x29, 0x23, &(0x7f0000000740)={{{@in=@remote, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@initdev}}, &(0x7f0000000840)=0xe8) getresuid(&(0x7f0000000880), &(0x7f00000008c0)=0x0, &(0x7f0000000900)) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0/file0\x00', 0x7fff, 0x7, &(0x7f0000000540)=[{&(0x7f0000000100)="20659da8507f5760a6a25d4f62d5a99451651495432c20aca51b16755056f67ff2ff9d4030714b24a709", 0x2a, 0x6}, {&(0x7f0000000140)="5f85a4051082841ab4d2bd642170d42388a5ead850c9f43c4145f5237b559bee4ebef8fafa02aab6a54d19cb249c018ad815e80f1596bd53595de1f64d00c1e74395703886a8051be7caa15e4650329bbd2debd8d7578d2ee29c37bcaf0f6c1c11abedb09b8011a028ea9f92c9ae093f93aaa18f4077570e0bc06752aee17a438f46d1daa9d748da246e97a634cf38af775b54f5f876706db728b294da1dd5d8b5d7e99359d3c3bd13b5eb0497186489a245419b01e52e1dfdbce52e2eb6f6c3a165fce1fd9997fd0d7681ace152368fe7d99201a4e1f53e1e3a8189f799ffcb4dee1a7a2881b07229690d84ff898ebfe33ef48164809cae44e5d1fd", 0xfc, 0xffff}, {&(0x7f0000000240)="47776ed12e3b590f05b9118eb2874b51ec8dd64ce9ac648f1a60be7e2dce64008f43f09ba3875b22a84f952989bac7564082eb93de56f1e0a7af5d5a9315b514f376951326799429bb1566e6fb098b5e39f79b3105e1f698a46517804c2bdf77f7852fed59ed84c62d7e5b70a3d226092efc3d023d7849e1f173f3cc82c8308b6d14feeb3dc4f7d946b4a528686be10fc561b83f692972f3ab47c5dadd49e266689932e49fd7ef6ada50ed62fcfb215b165c8d48f9ed09dd34c2f8755fa31cc806657c5169bd844c956970c101c9f171096fdf0a8ccf431ad1c522030581b574ee8a83a12003790f4dedc537efab", 0xee}, {&(0x7f0000000340)="7a8654745ac1548d299ae05c2c7a0f77bc66b49741e0b480d829777975b0d6e4b1abda642aef91e8aa0d", 0x2a, 0x5}, {&(0x7f0000000380)="88cdb93ac65b267e4dbb6035e64deb055c05b6fab4aabfcce6e8", 0x1a, 0x100}, {&(0x7f00000003c0)="99aefb9ac48600389b7f0a343a504c02b774eb8b001a0de354ac6def6902666dc8eebd6b247ca86c33c675e27d69d9621bcd1a689ecd28b3e4a28a1b099ce5e27b4c09b591ddc648c16e5ccd3312f89a2ef73a98a1f18a14e14982e1c76fc3", 0x5f, 0xe4}, {&(0x7f0000000440)="967bce1c5b87fed7f7619950ac97a26db68477e88bb7b8e67356a216efe3931f14703cb9bc6b65c6d8f9b792db73c9b9e3934da133041252813c7d57fb792be45c41ac53b5dd96e426a29d208204e688daa235202e129eb9fefd0795282b800e792936f5a6eb1cab5be346b061d5c30f768327589192fe11f312c923e94eee0a566d0312101222cc8588b576a1a7cf6cd35f505b6f04e69376ddf29f40316685b12a82d3077d45105f733eeee7b2ce78a76dae468e4a560613462773d651069bbaa0961a53f91dc72b461b8bcf240bec5cce69fc3e9f1129f84556d430f40daa9f7880e10de9439540d5e01e6aa6d03cddd594d6", 0xf4, 0x8}], 0x2, &(0x7f0000000940)={[{@errors_remount='errors=remount-ro'}, {@nodiscard='nodiscard'}, {@grpquota='grpquota'}, {@resize='resize'}], [{@seclabel='seclabel'}, {@appraise='appraise'}, {@context={'context', 0x3d, 'user_u'}}, {@smackfsdef={'smackfsdef'}}, {@fowner_lt={'fowner<', r0}}, {@uid_gt={'uid>', r1}}, {@euid_lt={'euid<', r2}}, {@smackfsfloor={'smackfsfloor'}}, {@rootcontext={'rootcontext', 0x3d, 'unconfined_u'}}]}) 04:23:24 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x11000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:24 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) 04:23:24 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0x800000000000000, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2459.273818][T13988] netlink: 'syz-executor2': attribute type 21 has an invalid length. [ 2459.305910][T14004] JFS: Cannot determine volume size [ 2459.310186][T13988] netlink: 'syz-executor2': attribute type 2 has an invalid length. 04:23:24 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xffffffff00000000, 0x0) [ 2459.327903][T14004] JFS: Cannot determine volume size [ 2459.347248][T14004] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:23:24 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:24 executing program 2: r0 = getuid() r1 = add_key$keyring(&(0x7f00000002c0)='keyring\x00', &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffb) keyctl$read(0xb, r1, &(0x7f0000000340)=""/111, 0x6f) syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f0000000080)='./file0\x00', 0x400, 0x1, &(0x7f0000000200)=[{&(0x7f0000000100)="59f98d6e53ea987ed6fd42af6fd9d9eca1661962875ae44c8eb76b8de8e7bfa0375e196812b7ddf40558d93c1c355f4292a57bdd3d12c6f24339685fc2ce20a25a1eb3ec5ec29f5eef0a4be9f202320e92061bc6e1840e68eb588c7851d28728d146085fa5e817c46da3f069d7c7a151062a3026014c6470aba012f410a8cdeacbfe5a0711d12a6bd156948951b919107f3d4354efaa6511c13cfb344fd04808e12d7671533fae181ebc51d37a54682b5cb7ce069b6e018c7f4e523f20b248b8c65e406568e2dc0a70f60ff0d8c2cb148af55666431300cb", 0xd8, 0xfffffffffffffffc}], 0x50002, &(0x7f0000000240)={[{@alloc_mode_def='alloc_mode=default'}, {@background_gc_on='background_gc=on'}], [{@euid_eq={'euid', 0x3d, r0}}, {@smackfstransmute={'smackfstransmute', 0x3d, ')'}}, {@appraise_type='appraise_type=imasig'}, {@smackfsfloor={'smackfsfloor', 0x3d, 'jfs\x00'}}]}) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1000000000000000, 0x0) 04:23:24 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 04:23:25 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0x806000000000000, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2459.433844][T14009] jfs: Unrecognized mount option "seclabel" or missing value [ 2459.498476][T14004] JFS: Cannot determine volume size [ 2459.509614][T14004] JFS: Cannot determine volume size [ 2459.524001][T14004] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:23:25 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1c000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:25 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0xd00000000000000, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:25 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$IP6T_SO_GET_REVISION_TARGET(r0, 0x29, 0x45, &(0x7f0000000100)={'NETMAP\x00'}, &(0x7f0000000080)=0x1e) [ 2459.640713][T14023] jfs: Unrecognized mount option "seclabel" or missing value 04:23:25 executing program 0: r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x3, 0x280000) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000001700)=ANY=[@ANYBLOB='resize,resize,resize=0x0000000000000000,discard=0x0000000000000200,iocharset=macroman,resize=0x0000C00000000400,fscontext=system_u,euid=', @ANYRESDEC=0x0, @ANYBLOB=',\x00']) 04:23:25 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x20000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:25 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) 04:23:25 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0x1000000000000000, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:25 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:25 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sndpcmp(&(0x7f0000000140)='/dev/snd/pcmC#D#p\x00', 0x39, 0x280) ioctl$TCSETAW(r0, 0x5407, &(0x7f0000000180)={0x5, 0xfffffffffffffff8, 0x0, 0x8001, 0x13, 0x6, 0x3, 0x2, 0x253, 0x7}) r1 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000080)='/dev/dsp\x00', 0x200000, 0x0) sendto$inet6(r0, &(0x7f00000001c0)="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", 0xfe, 0x10, &(0x7f00000002c0)={0xa, 0x4e20, 0xc, @rand_addr="109e41361815fbdf751fcd9204cc01e7", 0x7}, 0x1c) ioctl$TIOCSWINSZ(r1, 0x5414, &(0x7f0000000100)={0x7e, 0x5, 0x6, 0x800}) ioctl$DRM_IOCTL_AGP_INFO(r1, 0x80386433, &(0x7f0000000300)=""/64) 04:23:25 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x0, 0x2) setsockopt$bt_BT_VOICE(r0, 0x112, 0xb, &(0x7f0000000080)=0x3, 0x2) openat$autofs(0xffffffffffffff9c, &(0x7f0000000100)='/dev/autofs\x00', 0x0, 0x0) 04:23:25 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0x1400000000000000, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2459.947730][T14050] JFS: Cannot determine volume size [ 2459.957309][T14050] JFS: Cannot determine volume size 04:23:25 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) 04:23:25 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x43050000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) [ 2459.999136][T14050] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:23:25 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0x2000000000000000, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:25 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x60000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:25 executing program 0: r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/vfio/vfio\x00', 0x400, 0x0) setsockopt$XDP_RX_RING(r0, 0x11b, 0x2, &(0x7f00000002c0)=0x4400, 0x4) ioctl$VIDIOC_ENUMSTD(r0, 0xc0485619, &(0x7f0000000080)={0x1, 0x2000, "c2c53c2243fbaefde5ffb14e13c5034299ba3a4b43e42204", {0x5, 0xfffffffeffffffff}, 0x15d8}) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000000100)=ANY=[@ANYBLOB='resize,resize,resize=0x0000000000000000,discard=0x0000000000000200,iocharset=macroman,resize=0x0000000000000400,fscontext=system_u,euid=', @ANYRESDEC=0x0, @ANYBLOB="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"]) 04:23:25 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0x2800000000000000, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:25 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00') 04:23:25 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800e0000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:25 executing program 2: r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000000)='/dev/sequencer\x00', 0x40, 0x0) write$P9_RLERRORu(r0, &(0x7f0000000200)={0xd, 0x7, 0x1, {{}, 0x7f}}, 0xd) syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffff9c) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r1, 0x40045731, &(0x7f0000000040)=0x2) ioctl$VIDIOC_SUBDEV_G_DV_TIMINGS(r1, 0xc0845658, &(0x7f0000000100)={0x0, @bt={0x4, 0xffffffffffff7fff, 0x0, 0x2, 0x9, 0x8, 0x6, 0x200, 0x100000001, 0x4, 0x8, 0x7fff, 0x2, 0x782, 0x4, 0x6}}) 04:23:25 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0x3f00000000000000, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:25 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80350000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:25 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) 04:23:25 executing program 3: syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$radio(&(0x7f0000000000)='/dev/radio#\x00', 0x1, 0x2) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x18, 0xfa00, {0x0, &(0x7f0000000100)={0xffffffffffffffff}, 0x13f, 0x2}}, 0x20) write$RDMA_USER_CM_CMD_JOIN_IP_MCAST(r0, &(0x7f0000000180)={0x10, 0x30, 0xfa00, {&(0x7f0000000080), 0x4f7f, {0xa, 0x4e24, 0xb5da, @loopback, 0x9}, r1}}, 0x38) socket$rxrpc(0x21, 0x2, 0xa) write$RDMA_USER_CM_CMD_RESOLVE_IP(r0, &(0x7f0000000240)={0x3, 0x40, 0xfa00, {{0xa, 0x4e22, 0x9, @rand_addr="6c1a852b4fc812946f7af83592ead11e", 0x9}, {0xa, 0x4e21, 0x9, @rand_addr="0a04a9e52f70fcf46f4b42a0d0055f1b", 0x2}, r1, 0x3150000}}, 0xfffffffffffffe29) [ 2460.336857][T14080] JFS: Cannot determine volume size [ 2460.349184][T14080] JFS: Cannot determine volume size [ 2460.354428][T14080] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:23:26 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:26 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0x4000000000000000, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:26 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000001700)={[{@resize='resize'}, {@resize='resize'}, {@resize_size={'resize'}}, {@discard_size={'discard', 0x3d, 0x200}}, {@iocharset={'iocharset', 0x3d, 'macroman'}}, {@resize_size={'resize', 0x3d, 0x400}}], [{@fscontext={'fscontext', 0x3d, 'system_u'}}, {@euid_eq={'euid'}}]}) lsetxattr$security_evm(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='security.evm\x00', &(0x7f0000000100)=@ng={0x4, 0x9, "ed38e043fd"}, 0x7, 0x2) r0 = openat$dsp(0xffffffffffffff9c, &(0x7f0000000140)='/dev/dsp\x00', 0x8000, 0x0) r1 = fcntl$getown(0xffffffffffffffff, 0x9) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000001340)={{{@in=@loopback, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@remote}, 0x0, @in=@broadcast}}, &(0x7f0000001440)=0xe8) stat(&(0x7f0000001480)='./file0\x00', &(0x7f00000014c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$l2tp(0x18, 0x1, 0x1) r5 = socket$vsock_stream(0x28, 0x1, 0x0) r6 = accept$nfc_llcp(0xffffffffffffff9c, &(0x7f0000001540), &(0x7f00000015c0)=0x60) r7 = openat$vfio(0xffffffffffffff9c, &(0x7f0000001600)='/dev/vfio/vfio\x00', 0x0, 0x0) r8 = accept$nfc_llcp(0xffffffffffffff9c, &(0x7f0000001640), &(0x7f00000016c0)=0x60) r9 = openat$pfkey(0xffffffffffffff9c, &(0x7f00000017c0)='/proc/self/net/pfkey\x00', 0x400000, 0x0) r10 = openat$cgroup(0xffffffffffffffff, &(0x7f0000001800)='syz1\x00', 0x200002, 0x0) r11 = socket$rxrpc(0x21, 0x2, 0xa) r12 = mq_open(&(0x7f0000001840)='system_u', 0x1, 0x2, &(0x7f0000001880)={0x2, 0x7fff, 0xe55, 0x2, 0x7, 0x9, 0x400, 0x6}) socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f00000018c0)={0xffffffffffffffff, 0xffffffffffffffff}) r14 = syz_open_dev$sg(&(0x7f0000001900)='/dev/sg#\x00', 0x10000000000000, 0x8a140) fcntl$getownex(0xffffffffffffff9c, 0x10, &(0x7f0000001940)={0x0, 0x0}) r16 = getuid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000001980)={0x0, 0x0, 0x0}, &(0x7f00000019c0)=0xc) r18 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000001a00)='/dev/cachefiles\x00', 0x2000, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffff9c, 0x8903, &(0x7f0000001a40)=0x0) getresuid(&(0x7f0000001a80), &(0x7f0000001ac0), &(0x7f0000001b00)=0x0) r21 = getgid() sendmsg$unix(r0, &(0x7f0000001c40)={&(0x7f0000000180)=@file={0x1, './file0\x00'}, 0x6e, &(0x7f0000001300)=[{&(0x7f0000000200)="e386d96a2f98197cb473cbaa60774465cd9d20c43755b18406f82332850398a73af519f095a5f236a47d15a022009846490822c117e1b6ceac8ff859025f10194aa0e9aa502f3fe1b832f604ebbd034080ae2dc357dc23fb0089c0ae29c7fdfe347afc16a1ff5fbfbe2b164ed64f01f683f689", 0x73}, {&(0x7f0000000280)="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", 0x1000}, {&(0x7f0000001280)="c4209730187d163d7d12677d193ac2b85a54e20b479cb64fe5ac9b343801c0bd7b0d8873ac070a36890d79191b95ab6911a0746676cb057873985559b496a202eb2355b2ce9e4c78", 0x48}], 0x3, &(0x7f0000001b40)=[@cred={0x20, 0x1, 0x2, r1, r2, r3}, @rights={0x18, 0x1, 0x1, [r4, r5]}, @rights={0x28, 0x1, 0x1, [r6, r7, r8, r9, r10]}, @rights={0x20, 0x1, 0x1, [r11, r12, r13]}, @rights={0x18, 0x1, 0x1, [r14]}, @cred={0x20, 0x1, 0x2, r15, r16, r17}, @rights={0x18, 0x1, 0x1, [r18]}, @cred={0x20, 0x1, 0x2, r19, r20, r21}], 0xf0, 0xc090}, 0x40000) 04:23:26 executing program 2: 04:23:26 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:26 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0x4305000000000000, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:26 executing program 3: acct(&(0x7f0000000040)='./file0\x00') r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000100)='/dev/audio\x00', 0x1, 0x0) fadvise64(r0, 0x0, 0x1, 0x1) connect$rose(r0, &(0x7f0000000080)=@short={0xb, @dev={0xbb, 0xbb, 0xbb, 0x1, 0x0}, @netrom={0xbb, 0xbb, 0xbb, 0xbb, 0xbb, 0x0, 0x0}, 0x1, @rose={0xbb, 0xbb, 0xbb, 0x1, 0x0}}, 0x1c) 04:23:26 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jfs\x19', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) [ 2460.641405][T14110] JFS: Cannot determine volume size [ 2460.646639][T14110] JFS: Cannot determine volume size [ 2460.669001][T14110] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:23:26 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000140)='./file0\x00', 0x0, 0xca, 0x0, 0x0, 0x0) r0 = openat$vfio(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vfio/vfio\x00', 0x80000, 0x0) execveat(r0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)=[&(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='\xff}mime_type\x00', &(0x7f0000000200)='}\x00', &(0x7f0000000240)='jfs\x00'], &(0x7f00000003c0)=[&(0x7f00000002c0)='/dev/rfkill\x00', &(0x7f0000000300)='cgroup\xc8\x00', &(0x7f0000000340)='keyring]\x00', &(0x7f0000000380)='@trusted\x00'], 0x800) r1 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x2000, 0x0) ioctl$SIOCGSTAMPNS(r1, 0x8907, &(0x7f0000000100)) [ 2460.730511][T14110] JFS: Cannot determine volume size [ 2460.735758][T14110] JFS: Cannot determine volume size [ 2460.769932][T14110] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:23:26 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88470000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:26 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0x800e000000000000, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:26 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000001700)=ANY=[@ANYBLOB='resize,resize,resize=0x0000000000000000,discard=0x0000000000000200,iocharset=macroman,resize=0x0000000000000400,fscontext=system_u,euid=', @ANYRESDEC=0x0, @ANYBLOB='\x00\x00']) syz_open_dev$rtc(&(0x7f0000000040)='/dev/rtc#\x00', 0x800, 0x200200) prctl$PR_GET_TIMERSLACK(0x1e) r0 = syz_open_dev$midi(&(0x7f0000000080)='/dev/midi#\x00', 0x80000001, 0x2c8400) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) timerfd_settime(r0, 0x1, &(0x7f0000000140)={{r1, r2+10000000}, {0x77359400}}, &(0x7f0000000180)) 04:23:26 executing program 2: getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000000c0)={{{@in6=@dev, @in=@local, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@ipv4={[], [], @multicast1}}}, &(0x7f00000001c0)=0xe8) quotactl(0x100000000, &(0x7f0000000080)='./file1\x00', r0, &(0x7f0000000200)="99b7b30b4248911715a6930ec1a22fa6afd56381784a702e4a350a1b436083ff4f736a241104c1ee46ead02cee2724233f2c47ee84bcc3c3cdf68c22d38e748fee634505b39b89128f141afde1ed311bc79f50d90c3be88477d36fbc50e3134d7180f7794e2563353bdd6435666840e045b484dff742f7de8ce4142dff796a304f260f2f280a6ce482a53acf65fe9ae21c1bf1bf4087854df9b3c3102db003c8948847780cd8d3d4b299eb261612b05917f02d92fba3a5f24c5f1a35ee486f56135cd78e625dae1ee0895d2a54930f399ea9fcb4b8f8dbbc808bb115625dca316d3f5e") syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x34bf9c47454aa61, 0x0, 0x2, 0x0) 04:23:26 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 04:23:26 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88480000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:26 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jfs ', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) [ 2461.036339][T14137] JFS: Cannot determine volume size 04:23:26 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0x8035000000000000, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:26 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$cec(&(0x7f0000000040)='/dev/cec#\x00', 0x3, 0x2) ioctl$DRM_IOCTL_FREE_BUFS(r0, 0x4010641a, &(0x7f0000000100)={0x4, &(0x7f0000000080)=[0x2, 0xffff, 0x2, 0x10000]}) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x509200, 0x0) [ 2461.064911][T14137] JFS: Cannot determine volume size 04:23:26 executing program 2: 04:23:26 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88640000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) [ 2461.110588][T14137] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:23:26 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0x8100000000000000, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:26 executing program 2: syz_mount_image$jfs(&(0x7f0000000180)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x4, 0xffffffffffffff50, 0x0, 0x0, 0x0) mount$overlay(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='overlay\x00', 0x0, &(0x7f0000000100)={[{@metacopy_on='metacopy=on'}, {@xino_off='xino=off'}, {@upperdir={'upperdir', 0x3d, './file1'}}, {@nfs_export_off='nfs_export=off'}, {@index_off='index=off'}, {@lowerdir={'lowerdir', 0x3d, './file0'}}, {@metacopy_on='metacopy=on'}], [{@smackfsfloor={'smackfsfloor', 0x3d, 'jfs\x00'}}]}) [ 2461.204343][T14137] JFS: Cannot determine volume size [ 2461.221983][T14137] JFS: Cannot determine volume size 04:23:26 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88a8ffff}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) [ 2461.260490][T14137] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:23:26 executing program 0: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x1ff, 0x0, 0x0, 0xfffffffffffffffd, &(0x7f0000001700)=ANY=[@ANYBLOB="726573697a652c726573697a652c726573697a653d3078303030303030b59e30303030303030302c646973636172643d1378303030303030303030303030303230302c6e6f64697363618b642c726573697a653d4b78303030303030303030303030303430302c6673636f6e746578743d73797374656d5f752c657569643d", @ANYRESDEC=0x0, @ANYBLOB=',\x00']) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x10000, 0x0) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f0000000140)={0x0, 0x48, &(0x7f00000000c0)=[@in={0x2, 0x4e23, @empty}, @in6={0xa, 0x6f, 0x730, @rand_addr="1c71097bfa1c075f57e46d9169e6b7d1", 0x81}, @in6={0xa, 0x4e23, 0x4, @mcast2, 0x40}]}, &(0x7f0000000180)=0x10) getsockopt$inet_sctp_SCTP_LOCAL_AUTH_CHUNKS(r0, 0x84, 0x1b, &(0x7f00000001c0)={r1, 0x85, "454dc5f7d51a283f7cdb191bcfc17319b427964d19d4dac21af3647b366f37a4299feea0374026ad3f0b943c41e9427cf246ca5f9c9bc808b7db6acaaf718bad19c80364ee41a3db012d94d0ef4584678998e8b6c1575877df9fb142d796c3bf64c65a40cfecee4fec31f09eac82d6c337234393439edc49b8e00515d264928114e1367db7"}, &(0x7f0000000280)=0x8d) fstat(r0, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f00000002c0)='.\x00', &(0x7f0000000300)='9p\x00', 0x2000, &(0x7f00000003c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@cachetag={'cachetag'}}, {@cachetag={'cachetag', 0x3d, '^{4\'['}}, {@cache_none='cache=none'}, {@access_user='access=user'}, {@access_uid={'access', 0x3d, r2}}], [{@fsuuid={'fsuuid', 0x3d, {[0x38, 0x33, 0x30, 0x77, 0x39, 0x38, 0x73, 0x76], 0x2d, [0x3f, 0x74, 0x32, 0x64], 0x2d, [0x62, 0x34, 0x61, 0x77], 0x2d, [0x63, 0x33, 0x7b], 0x2d, [0x62, 0x73, 0x61, 0x0, 0x75, 0x0, 0x62]}}}, {@obj_type={'obj_type'}}, {@appraise='appraise'}, {@audit='audit'}]}}) 04:23:26 executing program 3: syz_mount_image$jfs(&(0x7f0000000400)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x1, 0x0, 0x0, 0x0, 0x0) r0 = fcntl$dupfd(0xffffffffffffff9c, 0x406, 0xffffffffffffffff) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000100)={0x897b, {{0xa, 0x4e20, 0x9d, @mcast1, 0xe7}}}, 0x88) ioctl$FS_IOC_FSGETXATTR(r0, 0x801c581f, &(0x7f0000000440)={0x8, 0x1, 0x18, 0x1, 0x6}) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f0000000000)={0x7, 0x1, 0x7, 0xcf3, 0x20}) syz_mount_image$hfsplus(&(0x7f0000000040)='hfsplus\x00', &(0x7f0000000080)='./file0\x00', 0x2000, 0x3, &(0x7f0000000340)=[{&(0x7f00000001c0)="2838aa9a30de1b2a5ea1fc855e911a430f65339ee42cda0b97d105b2d88c53afa14669f55f321ad3d104ff08b1af130b993078", 0x33, 0x1}, {&(0x7f0000000200)="b97730f18d057ae0d39abf2baaa6d400ad773b667234dd1e01f088c9da11e66e1b07875862ae1b49ae774889ec6283bd5f9ce69e8a6c4d18e6784233dc8ebffc27953e001e322a56ce6db658238d805957d42b2194d30ceec47112ec458aa487bed964fa19dfba071b26a16246655f0df095c726f3d15d9c1cd6fc8d76b10b0a29235cd829728df51c6ada0ec27fce70d65e13f1439183fc3df50bc411284a37a2d9212690c7e0fbb442afdd36ae8aeb398e9abe1f2f7cd74065734c19857b1c955964df8240d01194dd338dc6097c543c96858cc4c6972d6a0c5bd46fcdbb1c5260c81c8e48611a6adc83149cd700071c47", 0xf2, 0x10001}, {&(0x7f0000000300)="9a3edb6ab51fa36a76cedc1d32e269fbaac63b8227cff3538b2db723", 0x1c, 0x80000000}], 0x20, &(0x7f00000003c0)=ANY=[@ANYBLOB="6372788b22e200480775ae5d2c00"]) 04:23:26 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0x86ddffff00000000, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:26 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$sequencer(0xffffffffffffff9c, &(0x7f0000000040)='/dev/sequencer\x00', 0x10000, 0x0) ioctl$sock_inet_sctp_SIOCINQ(r0, 0x541b, &(0x7f0000000080)) 04:23:27 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jfs\x0f', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) 04:23:27 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x88caffff}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:27 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0x8847000000000000, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:27 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x3d, 0x0, 0x40080, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x800, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x5) ioctl$KVM_REGISTER_COALESCED_MMIO(r0, 0x4010ae67, &(0x7f0000000100)={0x98de089279f8e878, 0x10003}) 04:23:27 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x89060000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:27 executing program 3: semget$private(0x0, 0x6, 0x84) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 04:23:27 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0x8848000000000000, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:27 executing program 2: getsockopt$inet_sctp6_SCTP_GET_ASSOC_STATS(0xffffffffffffffff, 0x84, 0x70, 0x0, 0x0) sched_setaffinity(0x0, 0x375, &(0x7f0000000140)=0x5) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone(0x2902001fff, 0x0, 0xfffffffffffffffe, &(0x7f0000000000), 0xffffffffffffffff) ioctl$VIDIOC_S_SELECTION(0xffffffffffffffff, 0xc040565f, &(0x7f0000000100)={0x1, 0x0, 0x4, {0x7fffffff, 0xfff, 0x1ff, 0x7f}}) rt_sigtimedwait(&(0x7f0000000040), 0x0, &(0x7f0000000180)={0x0, 0x1c9c380}, 0x8) r0 = getpid() rt_tgsigqueueinfo(r0, r0, 0x16, &(0x7f0000000080)) ptrace(0x10, r0) ptrace$pokeuser(0x6, r0, 0x388, 0xffffffffffffffff) geteuid() r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vcs\x00', 0x200000, 0x0) mknodat(r1, &(0x7f0000000380)='./file0\x00', 0x1, 0x4) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffff9c, 0x0, 0x11, &(0x7f0000000640)={{{@in=@broadcast, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in6=@loopback}}, 0x0) r3 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000200)='/dev/vga_arbiter\x00', 0x0, 0x0) r4 = syz_genetlink_get_family_id$tipc(&(0x7f00000003c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r3, &(0x7f0000000340)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80008060}, 0xc, &(0x7f0000000300)={&(0x7f00000002c0)={0x1c, r4, 0x810, 0x70bd2d, 0x25dfdbff, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x800}, 0x24044005) syz_mount_image$hfs(&(0x7f00000000c0)='hfs\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000500)=ANY=[@ANYBLOB="63726561746f723d8911fe152c7061727f773078303030303030303030303030306666662c646f6e745f686173682c66756e633d46494c455f4d4d41502c666f776e65723d", @ANYRESDEC=0x0, @ANYBLOB=',subj_role=appraise_type=imasig,euid<', @ANYRESDEC=r2, @ANYBLOB=',\x00']) 04:23:27 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000001700)=ANY=[@ANYBLOB="726573697a652c726573697a652c726573697a653d3078303030303030090000000000000030302c6469736361726478303030303038303030696f636861ff7365743d6d6163726f6d616e2c726573697a653d30783030303030303030303030301720f4bc1f9b73f5303430302c6673636f6e746578743d7374656d50752c657579643d00008000", @ANYRESDEC=0x0, @ANYBLOB='$\x00']) getuid() 04:23:27 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfeffffff}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:27 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) 04:23:27 executing program 3: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000040)='/dev/rfkill\x00', 0x40000, 0x0) ioctl$RTC_IRQP_SET(r0, 0x4008700c, 0x1f8c) syz_mount_image$jfs(&(0x7f0000000140)='jfs\x00', &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 04:23:27 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0x8864000000000000, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2461.803284][T14203] JFS: Cannot determine volume size [ 2461.808626][T14203] JFS: Cannot determine volume size [ 2461.838645][T14203] jfs: Unrecognized mount option "resize=0x000000 " or missing value 04:23:27 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffa888}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:27 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0x88a8ffff00000000, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:27 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) 04:23:27 executing program 3: syz_mount_image$jfs(&(0x7f0000000080)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x100008000, 0x0) 04:23:27 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0x88caffff00000000, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:27 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffca88}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) [ 2461.975836][T14203] JFS: Cannot determine volume size [ 2461.984479][T14199] hfs: unable to parse mount options [ 2462.004901][T14203] JFS: Cannot determine volume size [ 2462.017559][T14203] jfs: Unrecognized mount option "resize=0x000000 " or missing value 04:23:27 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x7, 0xffffffffffffffb0, 0x0, 0x0, 0x0) 04:23:27 executing program 0: getsockopt$sock_cred(0xffffffffffffff9c, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0, 0x0}, &(0x7f0000000040)=0xc) setgroups(0x1, &(0x7f0000000080)=[r0]) 04:23:27 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0x8906000000000000, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:27 executing program 2: r0 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x100, 0x80) ioctl$VT_GETSTATE(r0, 0x5603, &(0x7f0000000080)={0x5, 0x0, 0x1}) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_X86_GET_MCE_CAP_SUPPORTED(r0, 0x8008ae9d, &(0x7f0000000100)=""/230) 04:23:27 executing program 3: getresuid(&(0x7f0000000100)=0x0, &(0x7f0000000140), &(0x7f0000000180)) r1 = geteuid() lstat(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f00000004c0)='/dev/dlm-control\x00', 0x80001, 0x0) setsockopt$bt_hci_HCI_TIME_STAMP(r3, 0x0, 0x3, &(0x7f0000000300)=0x200, 0xfffffffffffffffb) ioctl$KVM_GET_DIRTY_LOG(r3, 0x4010ae42, &(0x7f0000000500)={0x10003, 0x0, &(0x7f0000ffc000/0x2000)=nil}) getresgid(&(0x7f0000000540), &(0x7f0000000580)=0x0, &(0x7f00000005c0)) prctl$PR_CAPBSET_DROP(0x18, 0x0) lstat(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r6 = getegid() r7 = getegid() getresgid(&(0x7f0000000400), &(0x7f0000000440), &(0x7f0000000480)=0x0) setxattr$system_posix_acl(&(0x7f0000000000)='./file1\x00', &(0x7f00000000c0)='system.posix_acl_access\x00', &(0x7f0000000840)=ANY=[@ANYBLOB="02000000010007000000000002000700", @ANYRES32=r0, @ANYBLOB="02000200", @ANYRES32=r1, @ANYBLOB="040000000000000008000000", @ANYRES32=r2, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r4, @ANYBLOB="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", @ANYRES32=r5, @ANYBLOB="08000400", @ANYRES32=r6, @ANYBLOB='\b\x00\x00\x00', @ANYRES32=r7, @ANYBLOB="08000500", @ANYRES32=r8, @ANYBLOB="10000100000000002000000000000000"], 0x64, 0x1) syz_mount_image$jfs(&(0x7f0000000040)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0xfffffffffffffffd, 0x241, 0x0, 0x0, 0x0) 04:23:27 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffdd86}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:27 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jfs\x10', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) 04:23:27 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0xfffffffffffff000, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:27 executing program 0: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x1, &(0x7f0000001700)=ANY=[@ANYBLOB='resize,resize,resize=0x0000000000000000,discard=0x0000000000000200,iocharset=macroman,resize=0x0000000000000400,fscontext=system_u,euid=', @ANYRESDEC=0x0, @ANYBLOB='\x00\x00']) mknod(&(0x7f0000000040)='./file0\x00', 0xa, 0x4) 04:23:27 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffff000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:27 executing program 3: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x44080, 0x0) ioctl$KVM_PPC_GET_PVINFO(r0, 0x4080aea1, &(0x7f0000000100)=""/189) 04:23:27 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0x0, 0x2, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:28 executing program 2: r0 = syz_open_dev$media(&(0x7f0000000040)='/dev/media#\x00', 0xa7, 0x0) ioctl$ION_IOC_HEAP_QUERY(r0, 0xc0184908, &(0x7f0000000100)={0x34, 0x0, &(0x7f0000000080)}) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000200)='./file0\x00', 0x7fffffff, 0x0, 0x0, 0x0, 0x0) readlinkat(r0, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000180)=""/84, 0x54) connect$caif(r0, &(0x7f0000000140), 0x18) 04:23:28 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:28 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) open(&(0x7f0000000040)='./file0/file0\x00', 0x2003, 0x8) 04:23:28 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0x0, 0x4, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2462.560495][T14260] JFS: Cannot determine volume size [ 2462.565756][T14260] JFS: Cannot determine volume size [ 2462.565786][T14260] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:23:28 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0xf0ffffffffffff}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) [ 2462.660380][T14260] JFS: Cannot determine volume size 04:23:28 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) [ 2462.689466][T14260] JFS: Cannot determine volume size [ 2462.698971][T14260] jfs: Unrecognized mount option "fscontext=system_u" or missing value 04:23:28 executing program 3: syz_mount_image$minix(&(0x7f0000000080)='minix\x00', &(0x7f0000000100)='./file0\x00', 0x81, 0xa, &(0x7f0000001740)=[{&(0x7f0000000140)="54f448a50fa6fe26d4e3660ff5fc05e34fa9bf89f25b415f31bb53a6b2400923acf53b85273a1d29cc98cb4ccd3252199e583688bd821c00c5ead1f6f1ed67b9b188cf4d26f17aa377fd416ac1aca95d8ee6711fe5ef97e66ebb9955c1653a3ba6463b1fe63f6a3f206c74878c4f159e6304c8d8cd64241d03043fc40f318c60d51178e41d61cd331c313756d64f85d0267bf8da9f3539b0e69d43b399bf09ffb3494faca6bf950cdb5bbe4f8d635a08967bb9385a96df94203c0010c50e2d5a864205a30d5b726e849d060e2f96f116470424dabc7bd251a1eb701fd61d333709b215ad58e81a61eeaffd13e673af43c273126b1ad9ae9e75228fd8", 0xfc, 0x8}, {&(0x7f0000000240)="872f0da0395a27064e126b68ff9df2359bbfc930bdb3b29dedc212ef0a5083802c664cc8bf24702e67efb746d42cca4665c87788a0c0fb102316cc4a5ba843ad0067ca4f03585848bddfcd34aada608d29f097e1e551", 0x56, 0x6b}, {&(0x7f00000002c0)="9a17b035e86d1875d6b11eba3745f92d88973300fe63ff4d1f3dfdb8439afa36f104003bdcdfbaae232bddd19493a5d79286192ed7471c116573abbefad4c4796b1bf93c23ad4dc23890bdf35328963db2a55d877ef2f4796a27783433675a1afdbf99618ba6dc6fa64713e8b6249a7debff3f81f79d14b907847316fab6a7640ffbdb81a97a05a2a978abac0b435449581ad14290c44a6ef3cf579397a7af80da59f733c6755478f54ce7cdef24e4fdb04efa108f8f339cbb246019", 0xbc, 0x55}, {&(0x7f0000000380)="5e39d7e2476316d310f7cda7f607e939807ab91ee9e4e6e80b23eedb07e03189abd4f0e3870dbaf8b3a1a0da25be39d5a1999e698326ca899e23069dcfefbeb5c8b75a0a7e46279f38d3468c73f29519296c1c88f228dde33a34b3afd25029cbfcca9aed7050d1e2f331bfae861d3ca2c98ca51419458a451c7424b87893d14f445e7c271f541b88bb3598500b91239169e617f9f6f82ffa6ed25c98e5c8c69e5f6800f7768dd3966c23f3ca24bd7f8faa1b34b678a0488b36136108600db4", 0xbf, 0x10001}, {&(0x7f0000000440)="319f3fae3114318f1848554338b4acbe8ca3f5ffd9674e6c1f08be8133b29c2d", 0x20, 0x4}, {&(0x7f0000000480)="e6b25489bb5b15287666e9a0beaa6d7f142d39abeaba5230bbafa49567533d7136aace58ad007a9b208626a5258f1168d8e97e8da0929928a95c1e8f08b4b57fa7ab3baccaf8af7b0f890929d0e7c5f894fca7e7b0d4eb26677bd4bec56600ac716766a51d1c6d517823b900acd93cb1b98a57d30b4038fc09ad809a7b265bf1eac60deeb0b9bbab7a25a0312778d62094fa124a84e24def64a5a99e15505979239a59e0bd6b70e43045554d4986f3fe3b073f9836b32d3d2827f66a9098e42bc6ec7fa6feafba", 0xc7, 0x6}, {&(0x7f0000000580)="009d3a3dcd", 0x5, 0x6}, {&(0x7f00000005c0)="c89a7b373754d12534bfba9bcecdab9a9cbb39ea55c27e5250d812368bdd43fb3f495386575a43e68a3036b56619f748202852967c7da455589b9da41239c3f352e8e03fa10a94cd34be1e01b508d71fbea070e8fcb776d85447035a0bbeef6ade40", 0x62, 0x1ff}, {&(0x7f0000000640)="332941d72a3678873b7a2bd31fa1879398e8d35f0d3a5824e176552b30b7cb48c94895a62226ac29e4fbc00aab3e49ed803341616ff160f7b3c37532334376bdf02720082d9c5ca15c58e49dbeb7f076be74b35f1cc67a57e5b1acc12d987ccdabacd78e87ab476e040e0e41daf4635e03920f1d048be2c13b1b0d27a823c88b5e9011785ddaa63ce1c2af2890866c174e819d1bff8c0bae1041a367c7e3e26056115150638781120e0986992fa15cdf0fb75689e133edc6ca0de62b65694acf0a66854b1558d72e1b4df6b9ace681a7c488fd851a3bea4c0f160b28c08a0e143dec9d6f", 0xe4, 0xfff}, {&(0x7f0000000740)="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", 0x1000}], 0x8, 0x0) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x9) 04:23:28 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0x0, 0x6, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:28 executing program 0: openat$rtc(0xffffffffffffff9c, &(0x7f0000000000)='/dev/rtc0\x00', 0x0, 0x0) pselect6(0x40, &(0x7f0000000180)={0x9}, 0x0, 0x0, 0x0, 0x0) 04:23:28 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:28 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) accept4(0xffffffffffffffff, &(0x7f00000002c0)=@rc, &(0x7f0000000340)=0x80, 0x80800) openat$zero(0xffffffffffffff9c, &(0x7f0000000380)='/dev/zero\x00', 0x0, 0x0) syz_open_dev$cec(&(0x7f00000003c0)='/dev/cec#\x00', 0x1, 0x2) r0 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) sendto(r0, &(0x7f0000000400)="d5b6295b58b24d2d45e1986105dfca15feb7a94783e25bcc805c74ef4e5ec10416ae753f31edeafe", 0x28, 0x20000000, &(0x7f0000000440)=@vsock={0x28, 0x0, 0x2711, @reserved}, 0x80) r1 = accept4$tipc(r0, 0x0, &(0x7f0000000040)=0xffffffffffffffd4, 0x801) fsetxattr$trusted_overlay_redirect(r1, &(0x7f0000000080)='trusted.overlay.redirect\x00', &(0x7f0000000100)='./file0\x00', 0x8, 0x1) mount$bpf(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x902410, &(0x7f00000001c0)={[{@mode={'mode', 0x3d, 0xe24}}, {@mode={'mode', 0x3d, 0x4}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x5431a57f}}, {@mode={'mode', 0x3d, 0x8d8}}, {@mode={'mode', 0x3d, 0x5}}, {@mode={'mode', 0x3d, 0x7}}], [{@permit_directio='permit_directio'}]}) 04:23:28 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0x0, 0x21, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:28 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200000000000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:28 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) 04:23:28 executing program 3: r0 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x2, 0x0) ioctl$IMCTRLREQ(r0, 0x80044945, &(0x7f0000000080)={0x4007, 0x2, 0x7, 0x8000}) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x60, 0x0, 0x0, 0x0) 04:23:28 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0x0, 0x29, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:28 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x300000000000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:28 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000040)='/proc/capi/capi20\x00', 0x7f66419d4f09194b, 0x0) r1 = syz_open_dev$dspn(&(0x7f0000000100)='/dev/dsp#\x00', 0xfffffffffffffff3, 0x0) linkat(r0, &(0x7f0000000080)='./file0\x00', r1, &(0x7f0000000140)='./file0\x00', 0x1000) fcntl$getownex(r0, 0x10, &(0x7f0000000180)={0x0, 0x0}) sched_setparam(r2, &(0x7f00000001c0)=0x7) 04:23:28 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000000000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:28 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x10000014c, 0x0, 0x0, 0x0) r0 = syz_open_dev$amidi(&(0x7f0000000040)='/dev/amidi#\x00', 0x100000, 0x1) ioctl$VIDIOC_G_TUNER(r0, 0xc054561d, &(0x7f0000000100)={0x0, "ab2e1c1c439e2c8e25572037720cb206e37206b131d2816556cfe5feac588286", 0x0, 0x20, 0x8, 0x8c, 0x0, 0x5, 0xcb2}) 04:23:29 executing program 0: 04:23:29 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0x0, 0x2b, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:29 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) 04:23:29 executing program 2: syz_mount_image$gfs2(&(0x7f0000000000)='gfs2\x00', &(0x7f0000000040)='./file0\x00', 0x8, 0x3, &(0x7f00000011c0)=[{&(0x7f0000000080)="f84b66100f7d60f941f73f996afa61df3199a5003e82cb01668fad2d4e89fb0602ff3c914eb84274f3c11e234de8b45d52bf2497242eed04ac5fde734706cfe68f5fe9a100dee0768df7a14ef245143e3132699608b0e97a57a791dce998fd98d54a433f78b6b38dc16e5d9195c9db5c3e46c809440f8cb0279c897ad05906c3165d944e64bd6c67f04fdef6506014416213a6a0993cac0eb61c85a5c517c8d50259bfc15c07f9fa6a631c2e4ff43096f887fd54056ad68011c1c1d240965b0830da0c82a8f0bdc549d9", 0xca, 0x5}, {&(0x7f0000000180)="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", 0x1000}, {&(0x7f0000001180)="696be895986d8e0990c5866eb82e63338a492cbc2ca012dece0a676ee3f5edddcd", 0x21, 0x4}], 0x80, &(0x7f0000001240)={[{@quota_account='quota=account'}, {@noacl='noacl'}, {@data_writeback='data=writeback'}, {@locktable={'locktable', 0x3d, '+lo'}}, {@commit={'commit', 0x3d, 0x5}}, {@noloccookie='noloccookie'}, {@discard='discard'}], [{@permit_directio='permit_directio'}, {@fsmagic={'fsmagic', 0x3d, 0x3}}, {@obj_role={'obj_role', 0x3d, '\xd5'}}, {@fsuuid={'fsuuid', 0x3d, {[0x36, 0x3f, 0x33, 0x72, 0x77, 0x36, 0x61, 0x74], 0x2d, [0x63, 0x77, 0x37, 0x76], 0x2d, [0x34, 0x33, 0x33, 0x67], 0x2d, [0x3f, 0x77, 0x61, 0x36], 0x2d, [0x7f, 0x34, 0x7d, 0x35, 0x66, 0x71, 0x32, 0x63]}}}]}) 04:23:29 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x600000000000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:29 executing program 3: r0 = syz_open_dev$vbi(&(0x7f0000000040)='/dev/vbi#\x00', 0x3, 0x2) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_UDP_GET_REMOTEIP(r0, &(0x7f0000000300)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000002c0)={&(0x7f0000000140)={0x17c, r1, 0x630, 0x70bd2d, 0x25dfdbff, {}, [@TIPC_NLA_BEARER={0xe8, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0xacf0, @remote, 0x4}}, {0x14, 0x2, @in={0x2, 0x4e20, @rand_addr=0x80000000}}}}, @TIPC_NLA_BEARER_NAME={0x14, 0x1, @l2={'eth', 0x3a, 'syzkaller0\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x8}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e23, 0x8001, @empty, 0x2}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0xa8a4, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x7ff}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @rand_addr=0x100}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x762a, @loopback, 0x101}}}}, @TIPC_NLA_BEARER_NAME={0x14, 0x1, @l2={'eth', 0x3a, 'syzkaller0\x00'}}]}, @TIPC_NLA_LINK={0x74, 0x4, [@TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0xff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2000000000000000}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1000}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7fffffff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x5}]}, @TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_SOCK={0x8, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}]}, @TIPC_NLA_MEDIA={0x4}]}, 0x17c}, 0x1, 0x0, 0x0, 0x4040040}, 0x40001) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_nlink(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='trusted.overlay.nlink\x00', &(0x7f00000003c0)={'U+', 0x7}, 0x28, 0x3) 04:23:29 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0x0, 0x2c, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:29 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x700000000000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:29 executing program 0: [ 2463.971833][T14335] gfs2: invalid mount option: permit_directio 04:23:29 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='trusted.overlay.upper\x00', &(0x7f0000000100)={0x0, 0xfb, 0x5d, 0x1, 0x5, "562b5901beef2f24c4beb6972fae7e45", "cae33d81fe752199755997b742c8b6bb6df3b583d116b038fd5ccc7343e9b80604c51bdf90aba4329f5719ecf94060252d4f1b2ac5a7646e2c7b95a14c014fb31aadf09c1c8fc44b"}, 0x5d, 0x3) 04:23:29 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0x0, 0x2f, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2464.027311][T14335] gfs2: can't parse mount arguments 04:23:29 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) 04:23:29 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800000000000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:29 executing program 0: [ 2464.154523][T14335] gfs2: invalid mount option: permit_directio [ 2464.164774][T14335] gfs2: can't parse mount arguments 04:23:29 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) get_thread_area(&(0x7f0000000040)={0x7, 0x20000800, 0x400, 0x7, 0x6, 0x7, 0x1, 0x4, 0x1, 0x4}) r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000080)='/dev/rfkill\x00', 0x400, 0x0) ioctl$SNDRV_CTL_IOCTL_PCM_NEXT_DEVICE(r0, 0x80045530, &(0x7f0000000100)=""/249) syz_mount_image$erofs(&(0x7f0000000200)='erofs\x00', &(0x7f0000000240)='./file0/file0\x00', 0x7, 0x2, &(0x7f0000000400)=[{&(0x7f0000000280)="49f2814aefdbef2e2f9a4217feab51f0540dc1b925af737c88d35a671080d04cea3bc6f7c38b39f56b527d78ca67873581f617286d6f6a1169a0ac752437d3af27805e2e24421f13fe9111130b924db4c2f4ba41492f04194e5cd05aa48772516089326433aa9c84afee16426ad47e36bffe421f58331c096e8e4133573eb4bf85b1e63940a60e4026deabfbc2896dcc20d5c57a1cd027aa0451fefd6367a614c49393c0793ff5700ee8a1f5023209d8c5ba16835ad59a328e426fbfa7f36567be3d8d2f072a82d7f94ed7d0fb6062df083aab0204", 0xd5, 0x7}, {&(0x7f0000000380)="703a2be729f17c22aabd019b4b03a210b51f68241afd5ca90f192c202ba75008a8489fa414cf2acb4b066df42191cbe217751718269299fcbf144b7ddd25619312ec40dc9758aad6a0668174cae495c947f278d1a55808c848ac6d2bb385c5e2d8f76190397c369bb066713d19dacd0e893add973e7b58", 0x77, 0xeb08}], 0x2, &(0x7f0000000440)={[{@fault_injection={'fault_injection', 0x3d, 0x4}}], [{@smackfstransmute={'smackfstransmute', 0x3d, '/dev/rfkill\x00'}}, {@smackfsdef={'smackfsdef', 0x3d, 'keyringppp1-'}}, {@func={'func', 0x3d, 'KEXEC_KERNEL_CHECK'}}]}) 04:23:29 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0x0, 0x3a, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:29 executing program 0: 04:23:29 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) chroot(&(0x7f0000000040)='./file0\x00') 04:23:29 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) 04:23:29 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x806000000000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:29 executing program 0: 04:23:29 executing program 3: syz_mount_image$jfs(&(0x7f0000000140)='jfs\x00', &(0x7f0000000080)='./file0\x00', 0x7f54, 0x310, 0x0, 0x10000000000, 0x0) 04:23:29 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd00000000000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:29 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0x0, 0x3c, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:29 executing program 0: 04:23:30 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sndseq(&(0x7f0000000040)='/dev/snd/seq\x00', 0x0, 0x40000) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000000100)={{0x9, 0xffffffffffffffff}, 'port0\x00', 0xaa, 0x20000, 0x4, 0xffff, 0x2, 0x7, 0x81, 0x0, 0x7, 0xfffffffffffffff8}) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_CLIENT(r0, 0xc04c5349, &(0x7f00000001c0)={0xf5d, 0x2, 0x10000}) 04:23:30 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) 04:23:30 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000000000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:30 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = socket$isdn(0x22, 0x3, 0x26) fcntl$notify(r0, 0x402, 0x80000002) 04:23:30 executing program 0: 04:23:30 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0x0, 0x7ffff, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:30 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$sndpcmc(&(0x7f0000000040)='/dev/snd/pcmC#D#c\x00', 0x14a4353f, 0x82080) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000100)=0x89, 0x4) bind$vsock_dgram(r0, &(0x7f0000000080)={0x28, 0x0, 0x2711, @my=0x0}, 0x10) 04:23:30 executing program 0: 04:23:30 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1100000000000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:30 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0x0, 0xffffff84, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:30 executing program 0: 04:23:30 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1400000000000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:30 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x80000, 0x0) lstat(&(0x7f0000001240)='./file0\x00', &(0x7f0000001280)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f0000000080)='./file0\x00', 0x5, 0x2, &(0x7f0000001200)=[{&(0x7f0000000100)="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", 0xfc, 0xb3}, {&(0x7f0000000200)="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", 0x1000, 0x1f}], 0x42, &(0x7f0000001300)={[{@fsync_mode_strict='fsync_mode=strict'}, {@nouser_xattr='nouser_xattr'}], [{@fowner_eq={'fowner', 0x3d, r0}}, {@subj_role={'subj_role', 0x3d, 'jfs\x00'}}]}) 04:23:30 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) 04:23:30 executing program 3: 04:23:30 executing program 0: 04:23:30 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0x0, 0xffffff88, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:30 executing program 0: 04:23:30 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1c00000000000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:30 executing program 3: r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/sys/net/ipv4/vs/conntrack\x00', 0x2, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffff9c, 0x84, 0x77, &(0x7f0000000080)={0x0, 0x5, 0x4, [0x3, 0x6, 0x2, 0x3]}, &(0x7f0000000100)=0x10) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f0000000140)={0x1, 0x2, 0x1, 0x5, r1}, 0x10) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 04:23:30 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0x0, 0xffffff89, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:30 executing program 0: [ 2465.189006][T14423] F2FS-fs (loop2): Invalid SB checksum offset: 2104067054 [ 2465.214736][T14423] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock 04:23:30 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000000000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) [ 2465.237960][T14423] F2FS-fs (loop2): Unable to read 2th superblock 04:23:30 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) [ 2465.279261][T14423] F2FS-fs (loop2): Invalid SB checksum offset: 2104067054 [ 2465.303692][T14423] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock [ 2465.347448][T14423] F2FS-fs (loop2): Unable to read 2th superblock [ 2465.502843][T14440] F2FS-fs (loop2): Invalid SB checksum offset: 2104067054 [ 2465.517455][T14440] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock [ 2465.526009][T14440] F2FS-fs (loop2): Unable to read 2th superblock [ 2465.532787][T14440] F2FS-fs (loop2): Invalid SB checksum offset: 2104067054 [ 2465.540095][T14440] F2FS-fs (loop2): Can't find valid F2FS filesystem in 1th superblock [ 2465.548425][T14440] F2FS-fs (loop2): Unable to read 2th superblock 04:23:31 executing program 2: r0 = openat$btrfs_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/btrfs-control\x00', 0x200, 0x0) ioctl$KVM_REGISTER_COALESCED_MMIO(r0, 0x4010ae67, &(0x7f0000000080)={0x7001, 0x101000}) openat$nullb(0xffffffffffffff9c, &(0x7f0000000000)='/dev/nullb0\x00', 0x4040, 0x0) 04:23:31 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$video(&(0x7f0000000040)='/dev/video#\x00', 0x9, 0x40) ioctl$VIDIOC_TRY_FMT(r0, 0xc0d05640, &(0x7f0000000100)={0xa, @pix_mp={0x1, 0x5, 0x36775d5f, 0x7, 0xb, [{0x80, 0x5a9}, {0x401, 0x3f}, {0x7f, 0x1}, {0xff, 0x8e3}, {0x1, 0x81}, {0x76a, 0xff}, {0x4, 0x8}, {0x5, 0x8}], 0xa28, 0x6, 0x4, 0x2, 0x3}}) 04:23:31 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev={0xac, 0x10}, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:31 executing program 0: 04:23:31 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f00000000000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:31 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) 04:23:31 executing program 0: 04:23:31 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev={0xac, 0x28}, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:31 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4305000000000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:31 executing program 2: execve(&(0x7f0000000040)='./file0\x00', &(0x7f0000000100)=[&(0x7f0000000080)='@$selinux\'-security#Nmime_typeppp0.procvmnet1\x00'], &(0x7f0000000340)=[&(0x7f0000000140)=':)\'%%%}%\x00', &(0x7f0000000180)='jfs\x00', &(0x7f00000001c0)='(!,)GPL)\x00', &(0x7f0000000200)='loproc\']ppp0keyringGPL\x00', &(0x7f0000000240)='jfs\x00', &(0x7f0000000280)='ppp0md5sum[\x00', &(0x7f00000002c0)='@/vboxnet1-cpusetkeyringcgroup^cpuset&trustedwlan1cpuset#nodev\x00', &(0x7f0000000300)='*vboxnet1:systemmime_type\tuser\\\x00']) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 04:23:31 executing program 3: rmdir(&(0x7f0000000040)='./file0\x00') syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 04:23:31 executing program 0: openat$random(0xffffffffffffff9c, &(0x7f0000000080)='/dev/urandom\x00', 0x20000006040, 0x0) 04:23:31 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6000000000000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:31 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev={0xac, 0x223}, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:31 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jfs\xc0', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) 04:23:31 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6009, 0x1) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='udf\x00', 0x0, 0x0) quotactl(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) 04:23:31 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000040)='/dev/null\x00', 0x440, 0x0) ioctl$PIO_UNISCRNMAP(r0, 0x4b6a, &(0x7f0000000100)="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") 04:23:31 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800e000000000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:31 executing program 2: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000100)='./file0\x00', 0x2000081, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$audion(&(0x7f0000000040)='/dev/audio#\x00', 0xcec0, 0x10001) ioctl$sock_bt_bnep_BNEPGETSUPPFEAT(r0, 0x800442d4, &(0x7f0000000080)=0x2) ioctl$TIOCSBRK(r0, 0x5427) 04:23:31 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev={0xac, 0x14, 0x10}, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:31 executing program 3: r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/dlm-monitor\x00', 0x100, 0x0) ioctl$sock_inet_sctp_SIOCINQ(r0, 0x541b, &(0x7f0000000200)) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = dup2(0xffffffffffffff9c, 0xffffffffffffff9c) getsockopt$inet_sctp_SCTP_STATUS(0xffffffffffffffff, 0x84, 0xe, &(0x7f0000000100)={0x0, 0x1, 0x7f, 0x5, 0x82e, 0x10000, 0x4, 0x7f8a, {0x0, @in6={{0xa, 0x4e20, 0x1d03, @dev={0xfe, 0x80, [], 0x21}, 0x5}}, 0x6, 0x1, 0x5, 0x80000001, 0x80000000}}, &(0x7f0000000040)=0xb0) setsockopt$inet_sctp_SCTP_AUTH_DEACTIVATE_KEY(r1, 0x84, 0x23, &(0x7f0000000080)={r2, 0x5348}, 0x8) [ 2466.140891][T14479] UDF-fs: warning (device loop1): udf_load_vrs: No VRS found [ 2466.164042][T14479] UDF-fs: Scanning with blocksize 512 failed [ 2466.189696][T14479] UDF-fs: warning (device loop1): udf_load_vrs: No VRS found [ 2466.214520][T14479] UDF-fs: Scanning with blocksize 1024 failed 04:23:31 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jfs\x0f', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) 04:23:31 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8035000000000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) [ 2466.244623][T14479] UDF-fs: warning (device loop1): udf_load_vrs: No VRS found [ 2466.265416][T14479] UDF-fs: Scanning with blocksize 2048 failed [ 2466.282688][T14479] UDF-fs: warning (device loop1): udf_load_vrs: No VRS found 04:23:31 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev={0xac, 0x14, 0x28}, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2466.297294][T14479] UDF-fs: Scanning with blocksize 4096 failed 04:23:31 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8100000000000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:31 executing program 2: syz_mount_image$jfs(&(0x7f0000001180)='jfs\x00', &(0x7f00000011c0)='./file0\x00', 0xfffffffffffffffb, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$mice(&(0x7f0000000040)='/dev/input/mice\x00', 0x0, 0x480) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000001200)={{{@in=@broadcast, @in=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@empty}, 0x0, @in=@multicast2}}, &(0x7f0000000000)=0xe8) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000004840)={@in={{0x2, 0x4e22, @rand_addr=0x9}}, 0x0, 0x7, 0x0, "a7c544b6f3a6e258b70a91c8adc98000f8947c5b13529a6353ef071d8023f965e080a0d71f43a5cf1c4d957d53a0eba5cfec58503fce394a767fee7ad2150ea994f40ddac4ea913f5dfcfd13bf4ac75a"}, 0xd8) sendmmsg(r0, &(0x7f0000004680)=[{{&(0x7f0000001300)=@hci={0x1f, r1, 0x1}, 0x80, &(0x7f0000001740)=[{&(0x7f00000000c0)="1cde3dd8c31901900221ad52cf7fbf9ab3f945e9f0", 0x15}, {&(0x7f0000001380)="9fbdfb500631d29a1d697210e4e82843d0d57fb851fd9878f16951e364e77a651819223a2b166589ca9f31ffb4dc957aa64f34a42e72bf50e334979fc338e978669c9535019f5755b2acfa6cb1998bc427", 0x51}, {&(0x7f0000001400)="15f0248d0d9943fb9b4900e0cf1e5195172247156cff8368122e836faf81068edd5d2066a8b5fc4877e980e7b9564c95a826b012f254b7203a2389c5a12161", 0x3f}, {&(0x7f0000001440)="9b6def37c76933d07b2a296470ff833a006fbf033c263b26c7c3d80d9c05408a243cc6a67ca6e1c82cba6ff6bd77fde3024a7ee4cb0ec8e12c2c44dd5f4fd2342c7f1b71a9cec1a8c456af00fc4bee0e83a579ed2a90ab24494187b61b9135e32497", 0x62}, {&(0x7f00000014c0)="f0931f79a5150270387c80a2c2df99b3e617ea4f05e6f4a83a36bac5a6770ba714187898047a3204b823ddbd8af534865e61f11f49d56dda92fbf941829b3d97b5a9c323202071b5d49a738e46fdfe62385466c7e7263bc66810c2d90e233b78ff14fa17e58d1e18514da8cb1104b4da0d8aaa56b34e50b85439c56cbd0062e8a14493ac1010078f1f1146", 0x8b}, {&(0x7f0000001580)="48bbd5a22d125bad60a791b3b6d9bcb783c37a844cabd9a3b2da258a0ba710d1bae0d27db260dc6555eb337fa538ab4ea0f817af16354793968c5f20486da527e05b17fc2a0dde5143fb6233492079307daec64a4beb83cae14d8853b19f821bef9ddabc5e1a248ce9c3e848550bfa3ff099be3a559a9386b0e157897d390a3f058716c66c898d13471df65523073ef6c50fb4e21e3a44a09b4a790e801bdfe136d9ceb63234855372e5d3cabf7e27416248621fe8bab5be07e65e9b960f5d60d8155aceaa532542cec38453590d423f42", 0xd1}, {&(0x7f0000001680)="9eb766a5218ccd99e25df778954c5de83c3ee8bb0cd6694ee620bd7b56973ef505106fcd718be36b9f4f375c31619d7dda0e535f45abbe92d197959a69e87e0e8ca679f84295a8300b0b8c69b1ef75131011d30034f2f016af99b5a915b57b1b7e932ffab6eb0355c6bba4aad1090a453385e4c9992469bd41af155a2429d3007c12c6359ed8a388e45b12cee79ee8ead4108da52c5a7eebef1f8fbae358d0ab38894388fde8472349c5cafd7c16d5e4021873a023b6", 0xb6}], 0x7, &(0x7f00000017c0)=[{0xd0, 0x115, 0x8001, "1ada576e8622c2d4d7960f4b7f2100eb1dae3a0036518a059a767a89e48550bdd3e14e65f7146cf3f387682a416bda981b41c02d7e58ecc8a97a484f6927b2074005f61beddbf329ff3d05a49e5a4e5bc2875f89d5031faa65d68041b81ac0c4fa470c7015f101b4f830144ee5dda70387ddac21eb74f4e60b60a1fa2fc51519453121179494fca23ce4d673ccb5bfaba56b0a1a2ec7e2b103702bf69ef119854098e2c19d6983233f257231e180b20a25c9c184bc0793734e9ef24395eb59"}, {0x10, 0x111}, {0x78, 0x11c, 0x3, "a113969162223595aeb4407f51e58992fff1499bb6d6830b14ee99733068ec5bf4136bf693c6eb194aac0a2c82d6694f53e1e00dd4a893ecd2783c7f32f364fbd19f04d0891e22829215606f883fcf4dbd1c26ef65c1f9919e16ce49380629ed48"}, {0x60, 0x104, 0x6, "3121997bca6d84df028f1503d662b044a95c630c3412b2eba70b1d774a453aa5c76a43a33e6a0cdced60980b06942a00938fb9c533b2783964d4e1eac90decc3069f1ded0a81c38a4fb5b5b3c6"}], 0x1b8}, 0x2}, {{&(0x7f0000001980)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f0000001b80)=[{&(0x7f0000001a00)="8d4588c90192c413409940ae14b1aac883d426b99f3cf301c2184435e1ff520b9676c418f8e0ed6930f128ac46a3da97174c07480441ea46940858a68cd002bd86", 0x41}, {&(0x7f0000001a80)="ee0ac5850676334669afe8336f67942247a807ff16d155173a0fa48577852fa8009fe47501d9f970fe13462f9640171865ad0509e0d525a5b307171423bad7c00ea087a2b873f3330f3741baed742eeedc78007ec010fa83d52713b6905c4feeb84620fe82", 0x65}, {&(0x7f0000001b00)="959cd3a86e13cf537a7c293048e1823cfb5a336f5f84b4d29257d587c23e1a69f66c4525c276a443d990f5117764db22ef8ce4e8d474dd1ebd471f6c2deb3d0b2c35e784df485f4b6c636d8c34c9fe051ceef004c99e63ba2c3f49007b8b5e803a97", 0x62}], 0x3, &(0x7f0000001bc0)=[{0x98, 0x119, 0x4, "672f716fc2cae096cf903ea8faf22c931bbfa756937423e5046dd4d474909223db0bb8f4dc496d1edc983d8c8279decb734190ae63f16bb194b5ec768976a129e45bc86e73074956c0b12c2a3f3c4387f8bbc2afaa4047b364083257c39fcb3d06ea6c006547afbe99c3c3ffd5e1e8fd65dae547a17d1c78d3a432e9c5ed09a1e8"}, {0x20, 0x1ff, 0x0, "726e9a431f7db74401243cb3c46e2a"}], 0xb8}, 0x7fffffff}, {{&(0x7f0000001c80)=@sco={0x1f, {0x8, 0x10000, 0xe1, 0x1, 0x1, 0x56}}, 0x80, &(0x7f0000001d80)=[{&(0x7f0000001d00)="5ad370f67a38bed51deefe6225c2a5f44a9b760d39bc1f8219a678c32ab8f0426f1c4accd467cd3299612cab98cddf2af10c9903a8c5743d2eb346b8e27caae19fcf11212016922f04fe7c8f144948caa27cdbddf6a10782adf5b1622e66c7f7248a29445860d99452617b89d175b3148ce55e161be460821df3ecba6d4459", 0x7f}], 0x1, &(0x7f0000001dc0)=[{0xf8, 0x116, 0x73, "92b3b2ee42837225864bc659256e59409352716348eb4b12e1e182844c6c8fb300830958072d8874ce68986ba838e30a82992a385ff8347350d08326fb35994fd6e7252a88aa5a561e17f311c94e25b8e4e6993e8cbede288e55ce609697f0c7d039646ad2fd80805ccc4cfe203a838e26f839e0d29919cfe4c011c8439380a1db607f3f6bcdf4cba14b75667a3eec1b6be3a3775acbd8a2d58fc8f12d75cc3ea6e2218b509e86c82f9b3d921e15ff3defa267ed2f2602f9140b9affa5588a927371bb5804ab3311acfa7a0479dc9a4c5b68b4f78eb9e70a2c898c61f655fdcf91d4542bed882e61"}, {0xc8, 0x13b, 0x2, "901843de50b24baa863297fd5972f5c842422a4b8ce54cffe51624309079d05cace16f178de52ea15acd49545dad6827e5f3db0f261d9ad55fceba8b6b4c3d108cd2e6f9fbb65e16fb5c14ea77c06e10b4af012118ce193ff62d458b5a0002126466cb315311e1c69e5211018ac0163e5cdd58fce513fb5533a745568a8b9439394bbbfbe65b4113ed7b3cb2573358e1fecedc3b011f9a54b2404ac160c7ef17d48387dd663a3c8f94e43182ee3fa89668e58446"}, {0x30, 0x117, 0x4, "f33b000900a0559e9b70d416010dd3efd38151efdaff9169bbea92f2cc8f"}, {0x18, 0x104, 0xf4, ']'}, {0x40, 0x113, 0x1, "afa332dab97fb5bfd4447075ba5d962e79ea3f8a9b5d03953cb0c02a1beca4c5ef7a5dccea7a7a0453"}], 0x248}, 0x1}, {{&(0x7f0000002040)=@generic={0x3, "79d84473d988be66b99567db970c3077ba25a58cb10f37336f00b2ec36da578c011f60c9f5ebe801dd5b397b0ae717812fd0899b207ed5b7fca7f164828fef2e1d0db3f154e8d8f1b89ed83aec0cab5195dc317a8748296addc69580a2a036f9560d95ec4066d330c94ff4adbc265e4734f05d9141f6024f8bd1a2c04fe7"}, 0x80, &(0x7f0000003500)=[{&(0x7f00000020c0)="199f7fdedefc7d2e4e59e209ea66d5d8e62327c4add53c10ff7cdfba57673afd9bb2f7e79f50074c0821dad92cc1680ef7d3a6ecbfb74263b81d93120a964b1132385dbdc5c8b744e892a7eff76d4095c80d1b463ec833f1a0d0a8a6f82698e05f950efc828c316c0c085589d94ca6fd2ae0e62d1500b060ef1fb6567cedecc0ac99438675f85d9919cadafcf294e18d3b01926fc8924221c9d2ec09ff088f79d17a3a3e987ac0de0fdcfb110d9ec0d4f1e138c938b42906bfada1e571f42599cbdd4bca619c48a7d77aa6bf7fa7ee6a5fd2c40066d6e6403308356009fefd03176d62575088779bf44e5d2ca2", 0xed}, {&(0x7f00000021c0)="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", 0x1000}, {&(0x7f00000031c0)="9b65939371dd1dfbb11d08fa504f83bf8e2efa72235e8ebbe280fac38594e527e686d0718837619ad9e660812f71a0b744e68e780048c24f8986e8ce6eb6814fc6b58fd6b1006cad51cddece6667919f5977c62f15c8b718cfce037b1c6fe7046ec9fce36e3874bf5004f05d575fa069bef4b5ae9b5c5a746833935dc7f3d5e97befcba5", 0x84}, {&(0x7f0000003280)="f01114f5b0b92ff135a66baef840a136a193ff3fa456ff6148e809a96c5532244e35b2b998a835fff7f7e988e3c51c4b051477356e99ab4bdce067ce512455b9cdeaa2b73f1174e659712330552ce99e52113ba6d1399d9b3b6a28409d4860b757269ad92d576727563d5fda56fc452c28c9e44af5b1d8b9f81ae33b281cdabf3c2ebeb9a90755460579687a6e427fa9a6da8cdb5662d111dd0ca6a78725a6e5b78dba5c0ed75c568a660edd8d5cec9d2d296c4247f6012b3c8e72ad69e3a7e8b775496405dbd026982aaf27d44de4c6423e6ee3", 0xd4}, {&(0x7f0000003380)="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", 0xfe}, {&(0x7f0000003480)="c2fdbd4399b26adf7860476934217bbd37e2d6b73a4dd8e4d5bf4fd4b8fe968667fed9bd9b929496b7bc7c350bd72c57c1ca723f1755341273437998ce3df8fe436d3c5a870c5b462c4e4af4bb00731c56cb2a51", 0x54}], 0x6}}, {{&(0x7f0000003580)=@un=@file={0x0, './file0\x00'}, 0x80, &(0x7f00000038c0)=[{&(0x7f0000003600)="ba0d7f57655ec9049ca3c2b3d7fb8f8ec2f80eee98653939dab98f133328428e9f131fddb913ea342e6f864559977dafe568d43cf3a04f85a98b52034e77a0", 0x3f}, {&(0x7f0000003640)}, {0x0}, {&(0x7f0000003680)="da5096bdb24b298b1d5869792ebca32cc563646b4c5d1c592fd0c7d6efa90b4d18f80102000c217121a28d1e3530cd043f859fb288f1c7c200fce4a350cb1653f1b251c2e08664efc35294405f44395826b4b13284d1a54a0ac2745cfb7ec836b9ce2a782c85185b11b9043b9dcb053259cadd8a5ddce0338f728f1c5eab145420ec75dc671a872fc2c023fec42b0c0369", 0x91}, {&(0x7f0000003740)="db23be3eec88bca87e739e639029f39511a76bd39e859a321cecbaa928f89ae2199b2e5900852c08960dd9d7ab7fd61bad6969bd865b6de8e5e305dbade863bace2699e54c1e8c58946647e2f1e65e909b01cc02c3f9c568b7bf350f3f995060244e71e385d9c7c6bb8865bb8edbfb8af93fcfe1a87a47", 0x77}, {&(0x7f00000037c0)="11b941e655d15be764845097ea3aeb920b02f789d11e76bafba95859fdc7bae8a89351f04519f9481a74dbb63a2abf236d8e87e81c99f7038fe0a0ae30b248e2ad6e002681d7cf209ea8e10813b739402ebd56c3afeaf924348c6f29720df3623d4f138b790ab0ff54aaac891cfb6c07ce21aacab587f16985b67d599403cb89478947087600fb2ab511e0b829b65f6359a6d06142e94267f152f48eda341a6e27f3258ee7362fc3114a4bfecc03663d6878e00bce511c6774122ec0d400c094a3603eaa5993b73ffd007542d7a2f3bd105d9d775aa3d1235bac5990972526d25e46265f22b817a85d132e1244b923b73252650ac4", 0xf5}], 0x6, &(0x7f0000003940)=[{0xb0, 0x1ff, 0x10001, "b5fa9f02c5bf1656e5a809a95676f34648a6d8d250cc45ddb119e4529ffd89496b78da80cdd3ddc2c1778a7391c6ca59438a761e5f73f238133a1fe86fa47b2e2f17fd28227487be96e33422f9acbc014a824273dd6cf420bb2efc48157e645c370062b6feaf5547148e7a17d271764c39a7522c390c0da64a7d3e79b92c85b261fce5cee1dc393c98cb57875f1a796475f988fb98bc805b8194c7bb"}, {0x60, 0x11f, 0x1, "0613bc471e2204503a6acf6c70c243be952c2efd9b0484bedc33acd5e9c34cb486c0ad3f6fc0c099419cceffc07a43d2ef36c69061473416381698c435ef701af4345f837bfb99c94460a6de615a4a00"}, {0x40, 0x12b, 0x3, "1be9675a1cb3da9a6097776a0a9ee08308a16cfeb99f772f423cc311d3a03a3e1a33bd2b3b41b5e61fa1c1830ed42f99"}, {0x60, 0x11, 0x7fff, "a3200a46fe831b02cd349d335fb8514cf676cd7ef339dbb56e14683f1b867dfc54eb856dd57fe0637ef2daa5b644bfd7bd5afeba4b5f9201468d2e88c231464c2c8764677599c893f5c2e4"}, {0x60, 0x88, 0xdfa, "dc5fbe709b772507fb82782c33c82a5613430b6c8decef7321258776de38f033b86c3a5ab61311f1cbab214ba6719d8d1a8cf8468796b4b4185d19c2a7bcf35f30ccc3b481eb63504f78e950a1ff28"}, {0x60, 0x117, 0x7f, "5384c0b75b7e575123f770cdc7fa65cdab9d0e56416519520a45b2a813d0fb2c2330d37b2811b3af6a1a98600cba42ad919d94663fe4595d719a8aef9553a9f8c60d9d61591d4ef3585d"}, {0x58, 0x101, 0x59, "1d3bb48927e98674a6a8444c59ba5e6199fb65940d50c7ed02f115d044b34f319b171e11969179c445fac458bea1c4be1597d72d44b4ce084235347e871e3c54c2be17"}], 0x2c8}, 0x100000000}, {{&(0x7f0000003c40)=@llc={0x1a, 0x17, 0x2400000000000000, 0x8, 0x7fffffff, 0x3ff, @remote}, 0x80, &(0x7f0000003f80)=[{&(0x7f0000003cc0)="10351e76cf7207b4a36b54d05826e92cdde8467accfbb5728984873e05537378e07daa34650a37bf40c23a667959fe9088992c9cc9981a3ce005ddb5c572724b3abca802126f4d77194fb4f8bfc1e4fd3629a178ab846b0d6b1693d21834cf9c180dd09900fb468007e0b62dd2ad2ed8f91997c8dc97745da9895821a5fcde7c915e0ea911d3902402fcd123ab8bbf918b428dd173118253dbd940cb9918286e", 0xa0}, {&(0x7f0000003d80)="53430a19f11f0cfaada0094475674221b87e4cd500f5a4c832f7a0d199d9e51f4deb3a8e4d54d2", 0x27}, {&(0x7f0000003dc0)="e5350373f15feff9564cbe4ce67551171665ce356530b366e45af1878ed49ec19afefb05e2ea59354463428434337b3ec9cad47542f27223db820e19132136f3cc718f20f1999c69a917bef86242112b56e0348b6fea8d08fb8377a3d0d0b4c569bbe811a8119ff7497e79c8da8e6e4a8d9dc60cd8768c5a39339261e8005f2df2a53b7690cfec0d7ffd39678d70d97f359f1ded69e10eb3", 0x98}, {&(0x7f0000003e80)="1f5de23ff364db4139a5285d924682dc34bbf914469554ebcc584a648b91195fc1fad9d10bf59ddea438efe92fcd042ddce652a832f5de4452429e0b28c4357ac3a9a13a3167c3c57c2c8a8d6c96145fa3c720caa8cc2d7449e26b336c2db7ef9856b08275a5326e2d3f2403a749ac29d84368a83491ac42a0d44a7c3eedae", 0x7f}, {&(0x7f0000003f00)="b64919df0e4c9a3ea84eee1a6e82da0d027b4706e757b6644484559ad970934c22356c549a0e87c4748d8941ec19a093d86630b7243030e4afae3341d75b72c66b85475fd56852c8c3ad4b209d9c009f70616bc3ec82d19ea9b8cfda1662604ca38aba2bc9040210e7e9cf4dccc8b744f04763e892b57094079e5e1533a0", 0x7e}], 0x5}, 0xd6}, {{0x0, 0x0, &(0x7f0000004500)=[{&(0x7f0000004000)="6878c403a79ce89366", 0x9}, {&(0x7f0000004040)="e4da8d67ca05c39e6e22726e4525dd84f8f413fca6cdfa649eb09e437d41d79a4d3a02597d441d7d90de116917f2156df3bb499093d2a190577cb96f0103dbd34dc68b88b2161c3f5af4f378d7a5268ee0ab48cbe08b6179f177567e5421c3cd3be836d7376daf25aa661333f42237852ea5be8ec0408a83434a5061414de595c291ec59070c8d8fd5baa3858c7b4e9ad81cc2d12a9ace145b7e1ad63ded73f4a71260c8178f41ebf51f704c66ba972190d4a90480ff2341e818829cac2d0a", 0xbf}, {&(0x7f0000004100)="2a92a511252bd53e32fb69bef265bcf8defc321c9b9793c8e15485ff3e47f4830ac4525be5dbd87ae413d577b2a60930704875d32c02e7cd891fe19deeecf0c1eca98ce01c95d45b62524e4fee64d084d1d7e543ce9d2cdd6c000c0c32b5fa854f4d30382fe265fdde90e8b8b7676a3a488256b6acaaee6a5d4709", 0x7b}, {&(0x7f0000004180)="4f016f50cb12f2ff73966f1e4a423d81fcaa59d20b8f4bd8396f3b88ccc2717fd84536d9e43f4c5b52c2834c1c32c5fbbd251803db654a957852990912397479233ace83c43a0434257e7bb72507c9121f4ffe826d66b055b09f6370b201c431050b89f0881a3325c5def3bf08ac1bb219abb9a974406784539d5401f8a8", 0x7e}, {&(0x7f0000004200)="0c1396b32a03a2f8313261abf9c84876d26a450028ec322e518638e2c17556aa404d79d5a3b0e7b9c93536ee938702bb820c4cb16bfb78b43eab9b3705a89756b764b220d146f36e6c14e8f449f0b6b09d0c0d4728e1bb0635c7253ed1208c0d8853abed48a41b40b79897c9", 0x6c}, {&(0x7f0000004280)="9de4559c19f8ef73d2ac60c6239e294c6e09985db5f65b6808b66ac6a9863a1463fd0ad8c890169a9b5b2ad6fa0601225b891223d8ce2db9faacdd81aeaa476a74eb41", 0x43}, {&(0x7f0000004300)="a4ea0cf106008df3cd1336c07e9548f9e2da738abbb0fc27a768356cca625665cb5cb0dfee7cbb01db17d9abd8b0998aa60b4aa4183a15d98fa5dc4dd7697ce994259c1b5d47e0cc7a569a4f82f017246611eb67d048242f2d8a122a9ad3d73ead47ec489374ae908e8ad9632b71528eb7c1ecd1d612b4315b4d736c117714a4b70b66d49f732361882f141c4a24dbf257f097248a1156cf26386cffbce4b243132e0cf008c016fe177432db2fb21e6c53b7f9383131e43136dd84ec8586c788df37e3220b1d97075804c6a7a8a7f7fed4c8eeb7bf363dd545327cdf520e", 0xde}, {&(0x7f0000004400)="423592d54b6498732bd650a796b9e425ebf6fdad7825e86ad2a62c61f867a66c599766acea8de16042efc3397116d7c009e8ea81eeb9455b384d7e42d44cf4a4d045d1d1c5e4dca6f669a4bc967548643ef320fd39bff982d7c2327de340e462df7a852de5fd865968ea1227bba9c845e6e81f67797aa6c7377cb3525e5661b9de648470e28298a950c4e0ae5e0edc72d3c56700b87c78a2aedad7e599d802e368615041891478626159fc5d9a9248c97dea5994a81f3e13a1dacec5bf654376aa8deb2583b9b23c92447f966f0eb5e50b603f52b3badf468e469c2130da0a9f81097f7114f35987e01ed1665a29786f99011858f9b11e0a13", 0xf9}], 0x8, &(0x7f0000004580)=[{0xf8, 0x10f, 0x8000000000000000, "9172e077d667ae497ac995544e24c8e25defbf9aa02b21bd23eb494675785afad84e400bc1ad1030fe76fa9c24fd264460526a064b93b649b1a58de291c941e5dcf7cba75cad87b0987b4b1ff10af3747c85268ce300991df6f73fc01cde61d45555b26d9e5c8b5807db8f44f0cd542cf0cf9a4db351d8ee20f56c48b9fef7fa489a58383c2d6920346c0a2901debd8f4204c4d93823b2b4e4bcb9578f7b59b2887f237f0d2d0c798a5663a31e3eaf3066d984266d669947a175749a95aef15dbfdde3cb5562125e3449b3e73c4ebddf536eaebcfcd154f3b30043486920f1710e"}], 0xf8}, 0x9}], 0x7, 0x4000040) sendto$unix(r0, &(0x7f0000000100)="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", 0x1000, 0x1, &(0x7f0000001100)=@file={0x0, './file0\x00'}, 0x6e) openat$cgroup_int(r0, &(0x7f0000000080)='cgroup.max.descendants\x00', 0x2, 0x0) 04:23:31 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file1\x00', 0x100000000, 0x0, 0x0, 0x4002, 0x0) 04:23:32 executing program 0: mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6009, 0x1) mount(&(0x7f00000001c0)=@filename='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f0000000200)='udf\x00', 0x0, 0x0) quotactl(0x0, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) ioctl$BLKPBSZGET(0xffffffffffffffff, 0x127b, 0x0) 04:23:32 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x86ddffff00000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:32 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev={0xac, 0x14, 0x223}, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) 04:23:32 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) 04:23:32 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8847000000000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) 04:23:32 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x7fffffff, 0x0, 0x0, 0x0, 0x0) 04:23:32 executing program 5: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x2000, 0x0, 0x11, 0x0, @dev={0xac, 0x14, 0x14, 0x2}, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply}}}}, 0x0) [ 2466.636774][ T2479] print_req_error: 155 callbacks suppressed [ 2466.636786][ T2479] print_req_error: I/O error, dev loop1, sector 64 flags 0 [ 2466.655616][ T2479] print_req_error: I/O error, dev loop1, sector 256 flags 0 [ 2466.664248][T14519] UDF-fs: error (device loop1): udf_read_tagged: read failed, block=256, location=256 04:23:32 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8848000000000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) [ 2466.713232][ T2480] print_req_error: I/O error, dev loop1, sector 512 flags 0 [ 2466.721370][T14519] UDF-fs: error (device loop1): udf_read_tagged: read failed, block=512, location=512 [ 2466.732128][T14519] UDF-fs: warning (device loop1): udf_load_vrs: No anchor found [ 2466.740531][T14519] UDF-fs: Scanning with blocksize 512 failed [ 2466.747086][ T2480] print_req_error: I/O error, dev loop1, sector 64 flags 0 04:23:32 executing program 1: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000e40)=ANY=[], 0x0}, 0x48) stat(0x0, 0x0) syz_mount_image$jfs(&(0x7f0000000340)='jfs\x00', &(0x7f0000000380)='./file0\x00', 0x4, 0x0, &(0x7f0000000680), 0x8, 0x0) 04:23:32 executing program 2: lgetxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@known='system.sockprotoname\x00', &(0x7f0000000100)=""/194, 0xc2) recvmmsg(0xffffffffffffffff, &(0x7f0000001fc0)=[{{0x0, 0x0, &(0x7f00000002c0)=[{&(0x7f0000000200)=""/156, 0x9c}], 0x1, &(0x7f0000000300)=""/4096, 0x1000}, 0x3}, {{&(0x7f0000001300)=@in6={0xa, 0x0, 0x0, @loopback}, 0x80, &(0x7f0000001580)=[{&(0x7f0000001380)=""/255, 0xff}, {&(0x7f0000001480)=""/25, 0x19}, {&(0x7f00000014c0)=""/31, 0x1f}, {&(0x7f0000001500)=""/122, 0x7a}], 0x4, &(0x7f00000015c0)=""/41, 0x29}, 0x34ae}, {{0x0, 0x0, &(0x7f0000001800)=[{&(0x7f0000001600)=""/200, 0xc8}, {&(0x7f0000001700)=""/94, 0x5e}, {&(0x7f0000001780)=""/57, 0x39}, {&(0x7f00000017c0)}], 0x4}, 0xfff}, {{&(0x7f0000001840)=@caif=@rfm, 0x80, &(0x7f0000001900)=[{&(0x7f00000018c0)=""/17, 0x11}], 0x1}, 0x4}, {{&(0x7f0000001940)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @local}}}, 0x80, &(0x7f0000001c40)=[{&(0x7f00000019c0)=""/92, 0x5c}, {&(0x7f0000001a40)=""/47, 0x2f}, {&(0x7f0000001a80)=""/97, 0x61}, {&(0x7f0000001b00)=""/143, 0x8f}, {&(0x7f0000001bc0)=""/85, 0x55}], 0x5}, 0x6}, {{&(0x7f0000001cc0)=@tipc=@name, 0x80, &(0x7f0000001ec0)=[{&(0x7f0000001d40)=""/45, 0x2d}, {&(0x7f0000001d80)=""/105, 0x69}, {&(0x7f0000001e00)=""/168, 0xa8}], 0x3, &(0x7f0000001f00)=""/171, 0xab}, 0xb80}], 0x6, 0x40, &(0x7f0000002140)={0x0, 0x989680}) setsockopt$inet_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000002180)='tls\x00', 0x4) setsockopt$inet6_MRT6_DEL_MFC(r0, 0x29, 0xcd, &(0x7f00000021c0)={{0xa, 0x4e21, 0x80000001, @local, 0xffff}, {0xa, 0x4e21, 0x8000, @ipv4={[], [], @broadcast}, 0x9ff}, 0x0, [0x3, 0x9, 0x2, 0x80, 0x8, 0x8001, 0x7fff, 0x7]}, 0x5c) syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 04:23:32 executing program 3: syz_mount_image$jfs(&(0x7f0000000000)='jfs\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0xfffffdf9, 0x0, 0x0, 0x0) ioctl$KVM_ENABLE_CAP_CPU(0xffffffffffffffff, 0x4068aea3, &(0x7f00000000c0)={0x7b, 0x0, [0x0, 0x8, 0x5, 0x6]}) madvise(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0xb) 04:23:32 executing program 4: syz_emit_ethernet(0x36, &(0x7f0000000000)={@local, @local, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x28, 0x0, 0x0, 0x0, 0x11, 0x0, @dev, @remote={0xac, 0x14, 0x223}}, @icmp=@timestamp_reply={0xe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8864000000000000}}}}}, &(0x7f0000000100)={0x0, 0x4, [0x20, 0xe7c]}) [ 2469.768882][T14519] syz-executor0(14519): getblk(): executed=9 bh_count=0 bh_state=0 bdev_super_blocksize=-1 size=1024 bdev_super_blocksize_bits=-1 bdev_inode_blkbits=12 [ 2472.802803][T14519] syz-executor0(14519): getblk(): executed=9 bh_count=0 bh_state=0 bdev_super_blocksize=-1 size=1024 bdev_super_blocksize_bits=-1 bdev_inode_blkbits=12 [ 2475.828875][T14519] syz-executor0(14519): getblk(): executed=9 bh_count=0 bh_state=0 bdev_super_blocksize=-1 size=1024 bdev_super_blocksize_bits=-1 bdev_inode_blkbits=12 [ 2478.858880][T14519] syz-executor0(14519): getblk(): executed=9 bh_count=0 bh_state=0 bdev_super_blocksize=-1 size=1024 bdev_super_blocksize_bits=-1 bdev_inode_blkbits=12 [ 2481.888884][T14519] syz-executor0(14519): getblk(): executed=9 bh_count=0 bh_state=0 bdev_super_blocksize=-1 size=1024 bdev_super_blocksize_bits=-1 bdev_inode_blkbits=12 [ 2484.908894][T14519] syz-executor0(14519): getblk(): executed=9 bh_count=0 bh_state=0 bdev_super_blocksize=-1 size=1024 bdev_super_blocksize_bits=-1 bdev_inode_blkbits=12 [ 2487.928892][T14519] syz-executor0(14519): getblk(): executed=9 bh_count=0 bh_state=0 bdev_super_blocksize=-1 size=1024 bdev_super_blocksize_bits=-1 bdev_inode_blkbits=12 [ 2490.948879][T14519] syz-executor0(14519): getblk(): executed=9 bh_count=0 bh_state=0 bdev_super_blocksize=-1 size=1024 bdev_super_blocksize_bits=-1 bdev_inode_blkbits=12 [ 2493.974819][T14519] syz-executor0(14519): getblk(): executed=9 bh_count=0 bh_state=0 bdev_super_blocksize=-1 size=1024 bdev_super_blocksize_bits=-1 bdev_inode_blkbits=12 [ 2497.004770][T14519] syz-executor0(14519): getblk(): executed=9 bh_count=0 bh_state=0 bdev_super_blocksize=-1 size=1024 bdev_super_blocksize_bits=-1 bdev_inode_blkbits=12 [ 2500.028877][T14519] syz-executor0(14519): getblk(): executed=9 bh_count=0 bh_state=0 bdev_super_blocksize=-1 size=1024 bdev_super_blocksize_bits=-1 bdev_inode_blkbits=12 [ 2503.058879][T14519] syz-executor0(14519): getblk(): executed=9 bh_count=0 bh_state=0 bdev_super_blocksize=-1 size=1024 bdev_super_blocksize_bits=-1 bdev_inode_blkbits=12 [ 2506.088876][T14519] syz-executor0(14519): getblk(): executed=9 bh_count=0 bh_state=0 bdev_super_blocksize=-1 size=1024 bdev_super_blocksize_bits=-1 bdev_inode_blkbits=12 [ 2509.108893][T14519] syz-executor0(14519): getblk(): executed=9 bh_count=0 bh_state=0 bdev_super_blocksize=-1 size=1024 bdev_super_blocksize_bits=-1 bdev_inode_blkbits=12 [ 2512.134822][T14519] syz-executor0(14519): getblk(): executed=9 bh_count=0 bh_state=0 bdev_super_blocksize=-1 size=1024 bdev_super_blocksize_bits=-1 bdev_inode_blkbits=12 [ 2515.158882][T14519] syz-executor0(14519): getblk(): executed=9 bh_count=0 bh_state=0 bdev_super_blocksize=-1 size=1024 bdev_super_blocksize_bits=-1 bdev_inode_blkbits=12 [ 2518.178877][T14519] syz-executor0(14519): getblk(): executed=9 bh_count=0 bh_state=0 bdev_super_blocksize=-1 size=1024 bdev_super_blocksize_bits=-1 bdev_inode_blkbits=12 [ 2521.198872][T14519] syz-executor0(14519): getblk(): executed=9 bh_count=0 bh_state=0 bdev_super_blocksize=-1 size=1024 bdev_super_blocksize_bits=-1 bdev_inode_blkbits=12 [ 2524.228911][T14519] syz-executor0(14519): getblk(): executed=9 bh_count=0 bh_state=0 bdev_super_blocksize=-1 size=1024 bdev_super_blocksize_bits=-1 bdev_inode_blkbits=12 [ 2527.248877][T14519] syz-executor0(14519): getblk(): executed=9 bh_count=0 bh_state=0 bdev_super_blocksize=-1 size=1024 bdev_super_blocksize_bits=-1 bdev_inode_blkbits=12 [ 2530.274728][T14519] syz-executor0(14519): getblk(): executed=9 bh_count=0 bh_state=0 bdev_super_blocksize=-1 size=1024 bdev_super_blocksize_bits=-1 bdev_inode_blkbits=12 [ 2533.299034][T14519] syz-executor0(14519): getblk(): executed=9 bh_count=0 bh_state=0 bdev_super_blocksize=-1 size=1024 bdev_super_blocksize_bits=-1 bdev_inode_blkbits=12 [ 2536.334675][T14519] syz-executor0(14519): getblk(): executed=9 bh_count=0 bh_state=0 bdev_super_blocksize=-1 size=1024 bdev_super_blocksize_bits=-1 bdev_inode_blkbits=12 [ 2539.364791][T14519] syz-executor0(14519): getblk(): executed=9 bh_count=0 bh_state=0 bdev_super_blocksize=-1 size=1024 bdev_super_blocksize_bits=-1 bdev_inode_blkbits=12 [ 2542.389704][T14519] syz-executor0(14519): getblk(): executed=9 bh_count=0 bh_state=0 bdev_super_blocksize=-1 size=1024 bdev_super_blocksize_bits=-1 bdev_inode_blkbits=12 [ 2545.414749][T14519] syz-executor0(14519): getblk(): executed=9 bh_count=0 bh_state=0 bdev_super_blocksize=-1 size=1024 bdev_super_blocksize_bits=-1 bdev_inode_blkbits=12 [ 2548.438883][T14519] syz-executor0(14519): getblk(): executed=9 bh_count=0 bh_state=0 bdev_super_blocksize=-1 size=1024 bdev_super_blocksize_bits=-1 bdev_inode_blkbits=12 [ 2551.458873][T14519] syz-executor0(14519): getblk(): executed=9 bh_count=0 bh_state=0 bdev_super_blocksize=-1 size=1024 bdev_super_blocksize_bits=-1 bdev_inode_blkbits=12 [ 2554.479783][T14519] syz-executor0(14519): getblk(): executed=9 bh_count=0 bh_state=0 bdev_super_blocksize=-1 size=1024 bdev_super_blocksize_bits=-1 bdev_inode_blkbits=12 [ 2557.498880][T14519] syz-executor0(14519): getblk(): executed=9 bh_count=0 bh_state=0 bdev_super_blocksize=-1 size=1024 bdev_super_blocksize_bits=-1 bdev_inode_blkbits=12 [ 2560.532964][T14519] syz-executor0(14519): getblk(): executed=9 bh_count=0 bh_state=0 bdev_super_blocksize=-1 size=1024 bdev_super_blocksize_bits=-1 bdev_inode_blkbits=12 [ 2563.558881][T14519] syz-executor0(14519): getblk(): executed=9 bh_count=0 bh_state=0 bdev_super_blocksize=-1 size=1024 bdev_super_blocksize_bits=-1 bdev_inode_blkbits=12 [ 2566.594897][T14519] syz-executor0(14519): getblk(): executed=9 bh_count=0 bh_state=0 bdev_super_blocksize=-1 size=1024 bdev_super_blocksize_bits=-1 bdev_inode_blkbits=12 [ 2569.618913][T14519] syz-executor0(14519): getblk(): executed=9 bh_count=0 bh_state=0 bdev_super_blocksize=-1 size=1024 bdev_super_blocksize_bits=-1 bdev_inode_blkbits=12 [ 2572.638893][T14519] syz-executor0(14519): getblk(): executed=9 bh_count=0 bh_state=0 bdev_super_blocksize=-1 size=1024 bdev_super_blocksize_bits=-1 bdev_inode_blkbits=12 [ 2575.658884][T14519] syz-executor0(14519): getblk(): executed=9 bh_count=0 bh_state=0 bdev_super_blocksize=-1 size=1024 bdev_super_blocksize_bits=-1 bdev_inode_blkbits=12 [ 2578.678900][T14519] syz-executor0(14519): getblk(): executed=9 bh_count=0 bh_state=0 bdev_super_blocksize=-1 size=1024 bdev_super_blocksize_bits=-1 bdev_inode_blkbits=12 [ 2581.698884][T14519] syz-executor0(14519): getblk(): executed=9 bh_count=0 bh_state=0 bdev_super_blocksize=-1 size=1024 bdev_super_blocksize_bits=-1 bdev_inode_blkbits=12 [ 2584.730877][T14519] syz-executor0(14519): getblk(): executed=9 bh_count=0 bh_state=0 bdev_super_blocksize=-1 size=1024 bdev_super_blocksize_bits=-1 bdev_inode_blkbits=12 [ 2587.759758][T14519] syz-executor0(14519): getblk(): executed=9 bh_count=0 bh_state=0 bdev_super_blocksize=-1 size=1024 bdev_super_blocksize_bits=-1 bdev_inode_blkbits=12 [ 2590.794916][T14519] syz-executor0(14519): getblk(): executed=9 bh_count=0 bh_state=0 bdev_super_blocksize=-1 size=1024 bdev_super_blocksize_bits=-1 bdev_inode_blkbits=12 [ 2593.818895][T14519] syz-executor0(14519): getblk(): executed=9 bh_count=0 bh_state=0 bdev_super_blocksize=-1 size=1024 bdev_super_blocksize_bits=-1 bdev_inode_blkbits=12 [ 2596.848877][T14519] syz-executor0(14519): getblk(): executed=9 bh_count=0 bh_state=0 bdev_super_blocksize=-1 size=1024 bdev_super_blocksize_bits=-1 bdev_inode_blkbits=12 [ 2599.874898][T14519] syz-executor0(14519): getblk(): executed=9 bh_count=0 bh_state=0 bdev_super_blocksize=-1 size=1024 bdev_super_blocksize_bits=-1 bdev_inode_blkbits=12 [ 2602.898893][T14519] syz-executor0(14519): getblk(): executed=9 bh_count=0 bh_state=0 bdev_super_blocksize=-1 size=1024 bdev_super_blocksize_bits=-1 bdev_inode_blkbits=12 [ 2605.918869][T14519] syz-executor0(14519): getblk(): executed=9 bh_count=0 bh_state=0 bdev_super_blocksize=-1 size=1024 bdev_super_blocksize_bits=-1 bdev_inode_blkbits=12 [ 2608.948896][T14519] syz-executor0(14519): getblk(): executed=9 bh_count=0 bh_state=0 bdev_super_blocksize=-1 size=1024 bdev_super_blocksize_bits=-1 bdev_inode_blkbits=12 [ 2611.968873][T14519] syz-executor0(14519): getblk(): executed=9 bh_count=0 bh_state=0 bdev_super_blocksize=-1 size=1024 bdev_super_blocksize_bits=-1 bdev_inode_blkbits=12 [ 2614.990906][T14519] syz-executor0(14519): getblk(): executed=9 bh_count=0 bh_state=0 bdev_super_blocksize=-1 size=1024 bdev_super_blocksize_bits=-1 bdev_inode_blkbits=12 [ 2615.075049][ T1039] INFO: task syz-executor0:14530 blocked for more than 140 seconds. [ 2615.104686][ T1039] Not tainted 5.0.0-rc2-next-20190115 #12 [ 2615.111021][ T1039] "echo 0 > /proc/sys/kernel/hung_task_timeout_secs" disables this message. [ 2615.144702][ T1039] syz-executor0 D27880 14530 23499 0x00000004 [ 2615.151135][ T1039] Call Trace: [ 2615.154437][ T1039] __schedule+0x897/0x1e60 [ 2615.184900][ T1039] ? pci_mmcfg_check_reserved+0x170/0x170 [ 2615.190699][ T1039] ? __lock_acquire+0x572/0x4a10 [ 2615.195641][ T1039] ? rwsem_down_read_failed+0x32e/0x6d0 [ 2615.224445][ T1039] ? mark_held_locks+0xb1/0x100 [ 2615.229370][ T1039] ? _raw_spin_unlock_irq+0x28/0x90 [ 2615.234566][ T1039] schedule+0xfe/0x350 [ 2615.238752][ T1039] ? kasan_check_read+0x11/0x20 [ 2615.278897][ T1039] ? __schedule+0x1e60/0x1e60 [ 2615.283597][ T1039] ? trace_hardirqs_off_caller+0x300/0x300 [ 2615.298901][ T1039] ? do_raw_spin_trylock+0x270/0x270 [ 2615.304333][ T1039] rwsem_down_read_failed+0x360/0x6d0 [ 2615.319661][ T1039] ? rt_mutex_futex_unlock+0x120/0x120 [ 2615.325243][ T1039] ? add_lock_to_list.isra.0+0x450/0x450 [ 2615.338913][ T1039] ? lock_acquire+0x1db/0x570 [ 2615.343607][ T1039] ? __get_super.part.0+0x203/0x2e0 [ 2615.348799][ T1039] ? ___might_sleep+0x1e7/0x310 [ 2615.368876][ T1039] ? lock_release+0xc40/0xc40 [ 2615.373565][ T1039] ? putname+0xef/0x130 [ 2615.377714][ T1039] call_rwsem_down_read_failed+0x18/0x30 [ 2615.383690][ T1039] down_read+0x9b/0x120 [ 2615.387850][ T1039] ? __get_super.part.0+0x203/0x2e0 [ 2615.393657][ T1039] ? __down_interruptible+0x740/0x740 [ 2615.399334][ T1039] ? rwlock_bug.part.0+0x90/0x90 [ 2615.404276][ T1039] __get_super.part.0+0x203/0x2e0 [ 2615.409617][ T1039] __get_super_thawed+0x153/0x310 [ 2615.414664][ T1039] ? rcu_pm_notify+0xd0/0xd0 [ 2615.419558][ T1039] ? get_super+0x50/0x50 [ 2615.423798][ T1039] ? putname+0xef/0x130 [ 2615.427951][ T1039] ? putname+0xef/0x130 [ 2615.432440][ T1039] ? rcu_read_lock_sched_held+0x110/0x130 [ 2615.438159][ T1039] ? kmem_cache_free+0x225/0x260 [ 2615.443441][ T1039] get_super_thawed+0x18/0x20 [ 2615.448122][ T1039] kernel_quotactl+0x200/0x1810 [ 2615.454162][ T1039] ? qtype_enforce_flag+0x80/0x80 [ 2615.459504][ T1039] ? kasan_check_read+0x11/0x20 [ 2615.464355][ T1039] ? _copy_to_user+0xc9/0x120 [ 2615.479247][ T1039] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2615.485493][ T1039] ? put_timespec64+0x115/0x1b0 [ 2615.498875][ T1039] ? _raw_spin_unlock_irq+0x28/0x90 [ 2615.504080][ T1039] ? nsecs_to_jiffies+0x30/0x30 [ 2615.518877][ T1039] ? do_syscall_64+0x8c/0x800 [ 2615.523559][ T1039] ? do_syscall_64+0x8c/0x800 [ 2615.528230][ T1039] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2615.549588][ T1039] ? trace_hardirqs_on+0xbd/0x310 [ 2615.554617][ T1039] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2615.594517][ T1039] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2615.600673][ T1039] ? trace_hardirqs_off_caller+0x300/0x300 [ 2615.606486][ T1039] __x64_sys_quotactl+0x97/0xf0 [ 2615.634833][ T1039] do_syscall_64+0x1a3/0x800 [ 2615.639501][ T1039] ? syscall_return_slowpath+0x5f0/0x5f0 [ 2615.645134][ T1039] ? prepare_exit_to_usermode+0x3b0/0x3b0 [ 2615.678881][ T1039] ? __switch_to_asm+0x34/0x70 [ 2615.683757][ T1039] ? trace_hardirqs_off_thunk+0x1a/0x1c [ 2615.698886][ T1039] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 2615.704872][ T1039] RIP: 0033:0x457ec9 [ 2615.708762][ T1039] Code: 6d b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 3b b7 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 2615.758866][ T1039] RSP: 002b:00007ff6707fbc78 EFLAGS: 00000246 ORIG_RAX: 00000000000000b3 [ 2615.767414][ T1039] RAX: ffffffffffffffda RBX: 0000000000000004 RCX: 0000000000457ec9 [ 2615.804646][ T1039] RDX: 0000000000000000 RSI: 0000000020000000 RDI: 0000000000000000 [ 2615.812800][ T1039] RBP: 000000000073bfa0 R08: 0000000000000000 R09: 0000000000000000 [ 2615.844774][ T1039] R10: 0000000000000000 R11: 0000000000000246 R12: 00007ff6707fc6d4 [ 2615.864453][ T1039] R13: 00000000004c4a21 R14: 00000000004d8198 R15: 00000000ffffffff [ 2615.875116][ T1039] [ 2615.875116][ T1039] Showing all locks held in the system: [ 2615.889048][ T1039] 1 lock held by khungtaskd/1039: [ 2615.894074][ T1039] #0: 000000008e7f6ab6 (rcu_read_lock){....}, at: debug_show_all_locks+0xc6/0x41d [ 2615.909636][ T1039] 1 lock held by udevd/3866: [ 2615.914235][ T1039] 1 lock held by rsyslogd/7702: [ 2615.924318][ T1039] #0: 0000000078867524 (&f->f_pos_lock){+.+.}, at: __fdget_pos+0x1b3/0x1f0 [ 2615.934323][ T1039] 2 locks held by getty/7792: [ 2615.944147][ T1039] #0: 00000000acbaeaa2 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 2615.955729][ T1039] #1: 00000000c5c7263c (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x30a/0x1eb0 [ 2615.971591][ T1039] 2 locks held by getty/7793: [ 2615.976263][ T1039] #0: 000000003e004f71 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 2616.005258][ T1039] #1: 000000003c10cbbc (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x30a/0x1eb0 [ 2616.038946][ T1039] 2 locks held by getty/7794: [ 2616.043630][ T1039] #0: 00000000b40824a5 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 2616.068856][ T1039] #1: 0000000000606023 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x30a/0x1eb0 [ 2616.078435][ T1039] 2 locks held by getty/7795: [ 2616.083430][ T1039] #0: 000000006722d0bc (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 2616.108874][ T1039] #1: 0000000098a918df (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x30a/0x1eb0 [ 2616.118442][ T1039] 2 locks held by getty/7796: [ 2616.138867][ T1039] #0: 0000000014863258 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 2616.147822][ T1039] #1: 00000000ee12dc9a (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x30a/0x1eb0 [ 2616.157724][ T1039] 2 locks held by getty/7797: [ 2616.162660][ T1039] #0: 00000000a966fb12 (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 2616.171856][ T1039] #1: 00000000d4f578b0 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x30a/0x1eb0 [ 2616.189017][ T1039] 2 locks held by getty/7798: [ 2616.193687][ T1039] #0: 000000005701960d (&tty->ldisc_sem){++++}, at: ldsem_down_read+0x33/0x40 [ 2616.218872][ T1039] #1: 00000000368083a4 (&ldata->atomic_read_lock){+.+.}, at: n_tty_read+0x30a/0x1eb0 [ 2616.228574][ T1039] 1 lock held by syz-executor1/11187: [ 2616.248878][ T1039] #0: 0000000063e4c18b (&rp->fetch_lock){+.+.}, at: mon_bin_read+0x60/0x640 [ 2616.257669][ T1039] 2 locks held by syz-executor0/14519: [ 2616.278874][ T1039] 1 lock held by syz-executor0/14530: [ 2616.284242][ T1039] #0: 000000009ef3961a (&type->s_umount_key#78){.+.+}, at: __get_super.part.0+0x203/0x2e0 [ 2616.294580][ T1039] [ 2616.296922][ T1039] ============================================= [ 2616.296922][ T1039] [ 2616.305647][ T1039] NMI backtrace for cpu 0 [ 2616.310113][ T1039] CPU: 0 PID: 1039 Comm: khungtaskd Not tainted 5.0.0-rc2-next-20190115 #12 [ 2616.318782][ T1039] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2616.328827][ T1039] Call Trace: [ 2616.332114][ T1039] dump_stack+0x1db/0x2d0 [ 2616.336446][ T1039] ? dump_stack_print_info.cold+0x20/0x20 [ 2616.342159][ T1039] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 2616.348402][ T1039] nmi_cpu_backtrace.cold+0x63/0xa4 [ 2616.353606][ T1039] ? lapic_can_unplug_cpu.cold+0x38/0x38 [ 2616.359233][ T1039] nmi_trigger_cpumask_backtrace+0x1be/0x236 [ 2616.365223][ T1039] arch_trigger_cpumask_backtrace+0x14/0x20 [ 2616.371106][ T1039] watchdog+0xbbb/0x1170 [ 2616.375362][ T1039] ? reset_hung_task_detector+0xd0/0xd0 [ 2616.380899][ T1039] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2616.386177][ T1039] ? trace_hardirqs_on+0xbd/0x310 [ 2616.391206][ T1039] ? kasan_check_read+0x11/0x20 [ 2616.396050][ T1039] ? __kthread_parkme+0xc3/0x1b0 [ 2616.400984][ T1039] ? trace_hardirqs_off_caller+0x300/0x300 [ 2616.406783][ T1039] ? do_raw_spin_trylock+0x270/0x270 [ 2616.412062][ T1039] ? schedule+0x108/0x350 [ 2616.416382][ T1039] ? do_raw_spin_trylock+0x270/0x270 [ 2616.421670][ T1039] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2616.427487][ T1039] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2616.433718][ T1039] ? __kthread_parkme+0xfb/0x1b0 [ 2616.438654][ T1039] kthread+0x357/0x430 [ 2616.442714][ T1039] ? reset_hung_task_detector+0xd0/0xd0 [ 2616.448249][ T1039] ? kthread_stop+0x920/0x920 [ 2616.452926][ T1039] ret_from_fork+0x3a/0x50 [ 2616.457585][ T1039] Sending NMI from CPU 0 to CPUs 1: [ 2616.463473][ C1] NMI backtrace for cpu 1 [ 2616.463480][ C1] CPU: 1 PID: 23415 Comm: kworker/u4:1 Not tainted 5.0.0-rc2-next-20190115 #12 [ 2616.463486][ C1] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2616.463490][ C1] Workqueue: bat_events batadv_nc_worker [ 2616.463496][ C1] RIP: 0010:__lock_acquire+0x1b1/0x4a10 [ 2616.463506][ C1] Code: 80 fa 03 0f 8e bf 10 00 00 48 c7 c6 a0 3a 57 8b 45 8b 84 24 78 08 00 00 48 ba 00 00 00 00 00 fc ff df 48 c1 ee 03 0f b6 34 16 <48> c7 c2 a0 3a 57 8b 83 e2 07 83 c2 03 40 38 f2 7c 09 40 84 f6 0f [ 2616.463510][ C1] RSP: 0018:ffff88808dd2f510 EFLAGS: 00000802 [ 2616.463516][ C1] RAX: ffffffff8b0b2d00 RBX: 0000000000000000 RCX: 0000000000000002 [ 2616.463521][ C1] RDX: dffffc0000000000 RSI: 0000000000000004 RDI: ffffffff899a45c8 [ 2616.463526][ C1] RBP: ffff88808dd2f7a0 R08: 0000000000000002 R09: 0000000000000001 [ 2616.463530][ C1] R10: 0000000000000000 R11: ffffffff899a45c0 R12: ffff888052378400 [ 2616.463535][ C1] R13: 0000000000000000 R14: 0000000000000000 R15: 0000000000000000 [ 2616.463540][ C1] FS: 0000000000000000(0000) GS:ffff8880ae700000(0000) knlGS:0000000000000000 [ 2616.463544][ C1] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 2616.463549][ C1] CR2: ffffffffff600400 CR3: 0000000052097000 CR4: 00000000001406e0 [ 2616.463554][ C1] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 2616.463558][ C1] DR3: 0000000000000000 DR6: 00000000fffe0ff0 DR7: 0000000000000400 [ 2616.463561][ C1] Call Trace: [ 2616.463564][ C1] ? __lock_acquire+0x572/0x4a10 [ 2616.463568][ C1] ? trace_hardirqs_on_caller+0x310/0x310 [ 2616.463571][ C1] ? do_raw_spin_trylock+0x270/0x270 [ 2616.463574][ C1] ? calc_wheel_index+0x220/0x220 [ 2616.463577][ C1] ? mark_held_locks+0x100/0x100 [ 2616.463581][ C1] ? mark_held_locks+0x100/0x100 [ 2616.463584][ C1] ? __lock_acquire+0x572/0x4a10 [ 2616.463588][ C1] ? add_lock_to_list.isra.0+0x450/0x450 [ 2616.463591][ C1] ? mark_held_locks+0x100/0x100 [ 2616.463595][ C1] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 2616.463598][ C1] ? batadv_nc_worker+0x300/0x920 [ 2616.463602][ C1] ? find_held_lock+0x35/0x120 [ 2616.463605][ C1] lock_acquire+0x1db/0x570 [ 2616.463608][ C1] ? batadv_nc_worker+0x167/0x920 [ 2616.463611][ C1] ? lock_release+0xc40/0xc40 [ 2616.463615][ C1] ? rcu_read_unlock_special+0x380/0x380 [ 2616.463618][ C1] ? process_one_work+0xbf1/0x1ce0 [ 2616.463622][ C1] batadv_nc_worker+0x19b/0x920 [ 2616.463625][ C1] ? batadv_nc_worker+0x167/0x920 [ 2616.463628][ C1] ? batadv_nc_purge_orig+0x50/0x50 [ 2616.463632][ C1] ? __lock_is_held+0xb6/0x140 [ 2616.463635][ C1] process_one_work+0xd0c/0x1ce0 [ 2616.463639][ C1] ? __bpf_trace_sched_wake_idle_without_ipi+0x10/0x10 [ 2616.463643][ C1] ? __switch_to_asm+0x34/0x70 [ 2616.463646][ C1] ? pwq_dec_nr_in_flight+0x4a0/0x4a0 [ 2616.463649][ C1] ? __schedule+0x89f/0x1e60 [ 2616.463653][ C1] ? pci_mmcfg_check_reserved+0x170/0x170 [ 2616.463656][ C1] ? retint_kernel+0x2d/0x2d [ 2616.463659][ C1] ? worker_thread+0x3b7/0x14a0 [ 2616.463663][ C1] ? find_held_lock+0x35/0x120 [ 2616.463666][ C1] ? lock_acquire+0x1db/0x570 [ 2616.463669][ C1] ? worker_thread+0x3cd/0x14a0 [ 2616.463672][ C1] ? kasan_check_write+0x14/0x20 [ 2616.463676][ C1] ? do_raw_spin_lock+0x156/0x360 [ 2616.463679][ C1] ? lock_release+0xc40/0xc40 [ 2616.463682][ C1] ? rwlock_bug.part.0+0x90/0x90 [ 2616.463686][ C1] ? trace_hardirqs_on_caller+0x310/0x310 [ 2616.463689][ C1] worker_thread+0x143/0x14a0 [ 2616.463692][ C1] ? process_one_work+0x1ce0/0x1ce0 [ 2616.463696][ C1] ? __kthread_parkme+0xc3/0x1b0 [ 2616.463699][ C1] ? lock_acquire+0x1db/0x570 [ 2616.463703][ C1] ? _raw_spin_unlock_irqrestore+0x6b/0xe0 [ 2616.463706][ C1] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2616.463709][ C1] ? trace_hardirqs_on+0xbd/0x310 [ 2616.463713][ C1] ? __kthread_parkme+0xc3/0x1b0 [ 2616.463716][ C1] ? trace_hardirqs_off_caller+0x300/0x300 [ 2616.463720][ C1] ? do_raw_spin_trylock+0x270/0x270 [ 2616.463723][ C1] ? schedule+0x108/0x350 [ 2616.463726][ C1] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2616.463730][ C1] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2616.463733][ C1] ? __kthread_parkme+0xfb/0x1b0 [ 2616.463736][ C1] kthread+0x357/0x430 [ 2616.463740][ C1] ? process_one_work+0x1ce0/0x1ce0 [ 2616.463743][ C1] ? kthread_stop+0x920/0x920 [ 2616.463746][ C1] ret_from_fork+0x3a/0x50 [ 2616.628858][ T1039] Kernel panic - not syncing: hung_task: blocked tasks [ 2616.892138][ T1039] CPU: 0 PID: 1039 Comm: khungtaskd Not tainted 5.0.0-rc2-next-20190115 #12 [ 2616.900801][ T1039] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 2616.910846][ T1039] Call Trace: [ 2616.914143][ T1039] dump_stack+0x1db/0x2d0 [ 2616.918480][ T1039] ? dump_stack_print_info.cold+0x20/0x20 [ 2616.924219][ T1039] panic+0x2cb/0x65c [ 2616.928116][ T1039] ? add_taint.cold+0x16/0x16 [ 2616.932792][ T1039] ? lapic_can_unplug_cpu.cold+0x38/0x38 [ 2616.938429][ T1039] ? ___preempt_schedule+0x16/0x18 [ 2616.943547][ T1039] ? nmi_trigger_cpumask_backtrace+0x19e/0x236 [ 2616.949698][ T1039] ? nmi_trigger_cpumask_backtrace+0x1fa/0x236 [ 2616.955845][ T1039] ? nmi_trigger_cpumask_backtrace+0x204/0x236 [ 2616.961997][ T1039] ? nmi_trigger_cpumask_backtrace+0x19e/0x236 [ 2616.968167][ T1039] watchdog+0xbcc/0x1170 [ 2616.972419][ T1039] ? reset_hung_task_detector+0xd0/0xd0 [ 2616.977961][ T1039] ? lockdep_hardirqs_on+0x415/0x5d0 [ 2616.983259][ T1039] ? trace_hardirqs_on+0xbd/0x310 [ 2616.988280][ T1039] ? kasan_check_read+0x11/0x20 [ 2616.993121][ T1039] ? __kthread_parkme+0xc3/0x1b0 [ 2616.998053][ T1039] ? trace_hardirqs_off_caller+0x300/0x300 [ 2617.003858][ T1039] ? do_raw_spin_trylock+0x270/0x270 [ 2617.009135][ T1039] ? schedule+0x108/0x350 [ 2617.013459][ T1039] ? do_raw_spin_trylock+0x270/0x270 [ 2617.018764][ T1039] ? _raw_spin_unlock_irqrestore+0xa4/0xe0 [ 2617.024570][ T1039] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 2617.030808][ T1039] ? __kthread_parkme+0xfb/0x1b0 [ 2617.035744][ T1039] kthread+0x357/0x430 [ 2617.039806][ T1039] ? reset_hung_task_detector+0xd0/0xd0 [ 2617.045346][ T1039] ? kthread_stop+0x920/0x920 [ 2617.050023][ T1039] ret_from_fork+0x3a/0x50 [ 2617.055689][ T1039] Kernel Offset: disabled [ 2617.060021][ T1039] Rebooting in 86400 seconds..